Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2004-2069 (GCVE-0-2004-2069)
Vulnerability from cvelistv5 – Published: 2005-05-05 04:00 – Updated: 2024-08-08 01:15- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:15:01.224Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"
},
{
"name": "ADV-2006-4502",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/4502"
},
{
"name": "[openssh-unix-dev] 20040127 OpenSSH - Connection problem when LoginGraceTime exceeds time",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=openssh-unix-dev\u0026m=107520317020444\u0026w=2"
},
{
"name": "16567",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/16567"
},
{
"name": "22875",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/22875"
},
{
"name": "23680",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/23680"
},
{
"name": "openssh-sshdc-logingracetime-dos(20930)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20930"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/download/esx/esx-202-200610-patch.html"
},
{
"name": "20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/451426/100/200/threaded"
},
{
"name": "FLSA-2006:168935",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/425397/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/download/esx/esx-213-200610-patch.html"
},
{
"name": "[openssh-unix-dev] 20040128 Re: OpenSSH - Connection problem when LoginGraceTime exceeds time",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=openssh-unix-dev\u0026m=107529205602320\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf"
},
{
"name": "17000",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/17000"
},
{
"name": "14963",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/14963"
},
{
"name": "17252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/17252"
},
{
"name": "17135",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/17135"
},
{
"name": "20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/451404/100/0/threaded"
},
{
"name": "oval:org.mitre.oval:def:11541",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11541"
},
{
"name": "RHSA-2005:550",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2005-550.html"
},
{
"name": "20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/451417/100/200/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-01-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-19T14:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"
},
{
"name": "ADV-2006-4502",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/4502"
},
{
"name": "[openssh-unix-dev] 20040127 OpenSSH - Connection problem when LoginGraceTime exceeds time",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=openssh-unix-dev\u0026m=107520317020444\u0026w=2"
},
{
"name": "16567",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/16567"
},
{
"name": "22875",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/22875"
},
{
"name": "23680",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/23680"
},
{
"name": "openssh-sshdc-logingracetime-dos(20930)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20930"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/download/esx/esx-202-200610-patch.html"
},
{
"name": "20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/451426/100/200/threaded"
},
{
"name": "FLSA-2006:168935",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://www.securityfocus.com/archive/1/425397/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/download/esx/esx-213-200610-patch.html"
},
{
"name": "[openssh-unix-dev] 20040128 Re: OpenSSH - Connection problem when LoginGraceTime exceeds time",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=openssh-unix-dev\u0026m=107529205602320\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf"
},
{
"name": "17000",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/17000"
},
{
"name": "14963",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/14963"
},
{
"name": "17252",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/17252"
},
{
"name": "17135",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/17135"
},
{
"name": "20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/451404/100/0/threaded"
},
{
"name": "oval:org.mitre.oval:def:11541",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11541"
},
{
"name": "RHSA-2005:550",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2005-550.html"
},
{
"name": "20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/451417/100/200/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2004-2069",
"datePublished": "2005-05-05T04:00:00",
"dateReserved": "2005-05-05T00:00:00",
"dateUpdated": "2024-08-08T01:15:01.224Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A02751E9-2D38-4495-9572-8D84D71D4773\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44CCF5CD-B434-4392-A79A-C1945D2AE30A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).\"}]",
"id": "CVE-2004-2069",
"lastModified": "2024-11-20T23:52:25.450",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2004-12-31T05:00:00.000",
"references": "[{\"url\": \"http://marc.info/?l=openssh-unix-dev\u0026m=107520317020444\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=openssh-unix-dev\u0026m=107529205602320\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2005-550.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/17000\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/17135\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/17252\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/22875\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/23680\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.osvdb.org/16567\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/425397/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/451404/100/0/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/451417/100/200/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/archive/1/451426/100/200/threaded\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/14963\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vmware.com/download/esx/esx-202-200610-patch.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vmware.com/download/esx/esx-213-200610-patch.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2006/4502\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/20930\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11541\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=openssh-unix-dev\u0026m=107520317020444\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=openssh-unix-dev\u0026m=107529205602320\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2005-550.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/17000\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/17135\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/17252\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/22875\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/23680\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/16567\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/425397/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/451404/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/451417/100/200/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/451426/100/200/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/14963\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vmware.com/download/esx/esx-202-200610-patch.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vmware.com/download/esx/esx-213-200610-patch.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2006/4502\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/20930\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11541\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2004-2069\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2004-12-31T05:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A02751E9-2D38-4495-9572-8D84D71D4773\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44CCF5CD-B434-4392-A79A-C1945D2AE30A\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=openssh-unix-dev\u0026m=107520317020444\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=openssh-unix-dev\u0026m=107529205602320\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2005-550.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17000\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17135\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/17252\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/22875\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/23680\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.osvdb.org/16567\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/425397/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/451404/100/0/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/451417/100/200/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/archive/1/451426/100/200/threaded\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/14963\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/download/esx/esx-202-200610-patch.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/download/esx/esx-213-200610-patch.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4502\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/20930\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11541\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=openssh-unix-dev\u0026m=107520317020444\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=openssh-unix-dev\u0026m=107529205602320\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2005-550.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17000\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17135\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/17252\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22875\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/23680\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/16567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/425397/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/451404/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/451417/100/200/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/451426/100/200/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/14963\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/download/esx/esx-202-200610-patch.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/download/esx/esx-213-200610-patch.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2006/4502\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/20930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11541\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
GHSA-PWVM-3XFP-52VG
Vulnerability from github – Published: 2022-04-29 03:00 – Updated: 2022-04-29 03:00sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).
{
"affected": [],
"aliases": [
"CVE-2004-2069"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2004-12-31T05:00:00Z",
"severity": "MODERATE"
},
"details": "sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).",
"id": "GHSA-pwvm-3xfp-52vg",
"modified": "2022-04-29T03:00:44Z",
"published": "2022-04-29T03:00:44Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2004-2069"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20930"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11541"
},
{
"type": "WEB",
"url": "http://marc.info/?l=openssh-unix-dev\u0026m=107520317020444\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=openssh-unix-dev\u0026m=107529205602320\u0026w=2"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2005-550.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/17000"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/17135"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/17252"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/22875"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/23680"
},
{
"type": "WEB",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf"
},
{
"type": "WEB",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/16567"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/425397/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/451404/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/451417/100/200/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/451426/100/200/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/14963"
},
{
"type": "WEB",
"url": "http://www.vmware.com/download/esx/esx-202-200610-patch.html"
},
{
"type": "WEB",
"url": "http://www.vmware.com/download/esx/esx-213-200610-patch.html"
},
{
"type": "WEB",
"url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"
},
{
"type": "WEB",
"url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2006/4502"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTA-2007-AVI-026
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées pour les produits VMware ESX Server 2.x et 3.0.x.
Description
De multiples vulnérabilités ont été découvertes dans le produit VMware ESX Server. Celles-ci concernent :
- Une mauvaise gestion des droits sur les clés SSL générées par vmware-config (CVE-2006-3589) ;
- certaines bibilothèques OpenSSL (CVE-2006-2937, CVE-2006-2940, CVE-2006-4339, CVE-2006-4343, CVE-2006-3738) ;
- OpenSSH (CVE-2004-2069, CVE-2006-0225, CVE-2003-0386, CVE-2006-4924, CVE-2006-5051, CVE-2006-5794) ;
- un débordement de tampon dans la fonction repr() utilisée par certaines applications en Python (CVE-2006-4980) ;
- un problème concernant les fichiers de disques virtuels ( .vmdk ou .dsk ) nouvellement créés, qui contiennent des blocs de fichiers de disques récemment effacés.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware ESX Server 3.0.x",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 2.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le produit VMware\nESX Server. Celles-ci concernent :\n\n- Une mauvaise gestion des droits sur les cl\u00e9s SSL g\u00e9n\u00e9r\u00e9es par\n vmware-config (CVE-2006-3589) ;\n- certaines bibiloth\u00e8ques OpenSSL (CVE-2006-2937, CVE-2006-2940,\n CVE-2006-4339, CVE-2006-4343, CVE-2006-3738) ;\n- OpenSSH (CVE-2004-2069, CVE-2006-0225, CVE-2003-0386, CVE-2006-4924,\n CVE-2006-5051, CVE-2006-5794) ;\n- un d\u00e9bordement de tampon dans la fonction repr() utilis\u00e9e par\n certaines applications en Python (CVE-2006-4980) ;\n- un probl\u00e8me concernant les fichiers de disques virtuels ( .vmdk ou\n .dsk ) nouvellement cr\u00e9\u00e9s, qui contiennent des blocs de fichiers de\n disques r\u00e9cemment effac\u00e9s.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-4339",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4339"
},
{
"name": "CVE-2006-3589",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3589"
},
{
"name": "CVE-2006-2940",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2940"
},
{
"name": "CVE-2004-2069",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-2069"
},
{
"name": "CVE-2006-4924",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4924"
},
{
"name": "CVE-2003-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-0386"
},
{
"name": "CVE-2006-4343",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4343"
},
{
"name": "CVE-2006-5794",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5794"
},
{
"name": "CVE-2006-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3738"
},
{
"name": "CVE-2006-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-0225"
},
{
"name": "CVE-2006-2937",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2937"
},
{
"name": "CVE-2006-5051",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5051"
},
{
"name": "CVE-2006-4980",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4980"
}
],
"links": [
{
"title": "Patch pour VMWare ESX Server 2.5.3 :",
"url": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html"
},
{
"title": "Patch pour VMware ESX Server 2.0.2 :",
"url": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html"
},
{
"title": "Patch pour VMware ESX Server 3.0.0 :",
"url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"
},
{
"title": "Patch pour VMWare ESX Server 2.1.3 :",
"url": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html"
},
{
"title": "Patch pour VMware ESX Server 2.5.4 :",
"url": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html"
},
{
"title": "Patch pour VMware ESX Server 3.0.1 :",
"url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"
}
],
"reference": "CERTA-2007-AVI-026",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-01-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es pour les produits VMware\nESX Server 2.x et 3.0.x.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware",
"vendor_advisories": [
{
"published_at": "2007-01-09",
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2007-0001",
"url": "None"
}
]
}
CERTA-2007-AVI-026
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées pour les produits VMware ESX Server 2.x et 3.0.x.
Description
De multiples vulnérabilités ont été découvertes dans le produit VMware ESX Server. Celles-ci concernent :
- Une mauvaise gestion des droits sur les clés SSL générées par vmware-config (CVE-2006-3589) ;
- certaines bibilothèques OpenSSL (CVE-2006-2937, CVE-2006-2940, CVE-2006-4339, CVE-2006-4343, CVE-2006-3738) ;
- OpenSSH (CVE-2004-2069, CVE-2006-0225, CVE-2003-0386, CVE-2006-4924, CVE-2006-5051, CVE-2006-5794) ;
- un débordement de tampon dans la fonction repr() utilisée par certaines applications en Python (CVE-2006-4980) ;
- un problème concernant les fichiers de disques virtuels ( .vmdk ou .dsk ) nouvellement créés, qui contiennent des blocs de fichiers de disques récemment effacés.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware ESX Server 3.0.x",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESX Server 2.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le produit VMware\nESX Server. Celles-ci concernent :\n\n- Une mauvaise gestion des droits sur les cl\u00e9s SSL g\u00e9n\u00e9r\u00e9es par\n vmware-config (CVE-2006-3589) ;\n- certaines bibiloth\u00e8ques OpenSSL (CVE-2006-2937, CVE-2006-2940,\n CVE-2006-4339, CVE-2006-4343, CVE-2006-3738) ;\n- OpenSSH (CVE-2004-2069, CVE-2006-0225, CVE-2003-0386, CVE-2006-4924,\n CVE-2006-5051, CVE-2006-5794) ;\n- un d\u00e9bordement de tampon dans la fonction repr() utilis\u00e9e par\n certaines applications en Python (CVE-2006-4980) ;\n- un probl\u00e8me concernant les fichiers de disques virtuels ( .vmdk ou\n .dsk ) nouvellement cr\u00e9\u00e9s, qui contiennent des blocs de fichiers de\n disques r\u00e9cemment effac\u00e9s.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-4339",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4339"
},
{
"name": "CVE-2006-3589",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3589"
},
{
"name": "CVE-2006-2940",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2940"
},
{
"name": "CVE-2004-2069",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-2069"
},
{
"name": "CVE-2006-4924",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4924"
},
{
"name": "CVE-2003-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-0386"
},
{
"name": "CVE-2006-4343",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4343"
},
{
"name": "CVE-2006-5794",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5794"
},
{
"name": "CVE-2006-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3738"
},
{
"name": "CVE-2006-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-0225"
},
{
"name": "CVE-2006-2937",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-2937"
},
{
"name": "CVE-2006-5051",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5051"
},
{
"name": "CVE-2006-4980",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4980"
}
],
"links": [
{
"title": "Patch pour VMWare ESX Server 2.5.3 :",
"url": "http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html"
},
{
"title": "Patch pour VMware ESX Server 2.0.2 :",
"url": "http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html"
},
{
"title": "Patch pour VMware ESX Server 3.0.0 :",
"url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"
},
{
"title": "Patch pour VMWare ESX Server 2.1.3 :",
"url": "http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html"
},
{
"title": "Patch pour VMware ESX Server 2.5.4 :",
"url": "http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html"
},
{
"title": "Patch pour VMware ESX Server 3.0.1 :",
"url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"
}
],
"reference": "CERTA-2007-AVI-026",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-01-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es pour les produits VMware\nESX Server 2.x et 3.0.x.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware",
"vendor_advisories": [
{
"published_at": "2007-01-09",
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2007-0001",
"url": "None"
}
]
}
GSD-2004-2069
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2004-2069",
"description": "sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).",
"id": "GSD-2004-2069",
"references": [
"https://www.suse.com/security/cve/CVE-2004-2069.html",
"https://access.redhat.com/errata/RHSA-2005:550"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2004-2069"
],
"details": "sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).",
"id": "GSD-2004-2069",
"modified": "2023-12-13T01:22:55.688057Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2004-2069",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://secunia.com/advisories/23680",
"refsource": "MISC",
"url": "http://secunia.com/advisories/23680"
},
{
"name": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html",
"refsource": "MISC",
"url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"
},
{
"name": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html",
"refsource": "MISC",
"url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"
},
{
"name": "http://marc.info/?l=openssh-unix-dev\u0026m=107520317020444\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=openssh-unix-dev\u0026m=107520317020444\u0026w=2"
},
{
"name": "http://marc.info/?l=openssh-unix-dev\u0026m=107529205602320\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=openssh-unix-dev\u0026m=107529205602320\u0026w=2"
},
{
"name": "http://rhn.redhat.com/errata/RHSA-2005-550.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2005-550.html"
},
{
"name": "http://secunia.com/advisories/17000",
"refsource": "MISC",
"url": "http://secunia.com/advisories/17000"
},
{
"name": "http://secunia.com/advisories/17135",
"refsource": "MISC",
"url": "http://secunia.com/advisories/17135"
},
{
"name": "http://secunia.com/advisories/17252",
"refsource": "MISC",
"url": "http://secunia.com/advisories/17252"
},
{
"name": "http://secunia.com/advisories/22875",
"refsource": "MISC",
"url": "http://secunia.com/advisories/22875"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf",
"refsource": "MISC",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf",
"refsource": "MISC",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf"
},
{
"name": "http://www.osvdb.org/16567",
"refsource": "MISC",
"url": "http://www.osvdb.org/16567"
},
{
"name": "http://www.securityfocus.com/archive/1/425397/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/425397/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/archive/1/451404/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/451404/100/0/threaded"
},
{
"name": "http://www.securityfocus.com/archive/1/451417/100/200/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/451417/100/200/threaded"
},
{
"name": "http://www.securityfocus.com/archive/1/451426/100/200/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/451426/100/200/threaded"
},
{
"name": "http://www.securityfocus.com/bid/14963",
"refsource": "MISC",
"url": "http://www.securityfocus.com/bid/14963"
},
{
"name": "http://www.vmware.com/download/esx/esx-202-200610-patch.html",
"refsource": "MISC",
"url": "http://www.vmware.com/download/esx/esx-202-200610-patch.html"
},
{
"name": "http://www.vmware.com/download/esx/esx-213-200610-patch.html",
"refsource": "MISC",
"url": "http://www.vmware.com/download/esx/esx-213-200610-patch.html"
},
{
"name": "http://www.vupen.com/english/advisories/2006/4502",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2006/4502"
},
{
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20930",
"refsource": "MISC",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20930"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11541",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11541"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2004-2069"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2005:550",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2005-550.html"
},
{
"name": "14963",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/14963"
},
{
"name": "16567",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/16567"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf"
},
{
"name": "17135",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/17135"
},
{
"name": "17252",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/17252"
},
{
"name": "17000",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/17000"
},
{
"name": "http://www.vmware.com/download/esx/esx-202-200610-patch.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/download/esx/esx-202-200610-patch.html"
},
{
"name": "http://www.vmware.com/download/esx/esx-213-200610-patch.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/download/esx/esx-213-200610-patch.html"
},
{
"name": "22875",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/22875"
},
{
"name": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"
},
{
"name": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"
},
{
"name": "23680",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/23680"
},
{
"name": "ADV-2006-4502",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2006/4502"
},
{
"name": "[openssh-unix-dev] 20040127 OpenSSH - Connection problem when LoginGraceTime exceeds time",
"refsource": "MLIST",
"tags": [],
"url": "http://marc.info/?l=openssh-unix-dev\u0026m=107520317020444\u0026w=2"
},
{
"name": "[openssh-unix-dev] 20040128 Re: OpenSSH - Connection problem when LoginGraceTime exceeds time",
"refsource": "MLIST",
"tags": [],
"url": "http://marc.info/?l=openssh-unix-dev\u0026m=107529205602320\u0026w=2"
},
{
"name": "openssh-sshdc-logingracetime-dos(20930)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20930"
},
{
"name": "oval:org.mitre.oval:def:11541",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11541"
},
{
"name": "20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/451426/100/200/threaded"
},
{
"name": "20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/451417/100/200/threaded"
},
{
"name": "20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/451404/100/0/threaded"
},
{
"name": "FLSA-2006:168935",
"refsource": "FEDORA",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/425397/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-19T15:30Z",
"publishedDate": "2004-12-31T05:00Z"
}
}
}
RHSA-2005:550
Vulnerability from csaf_redhat - Published: 2005-09-28 14:32 - Updated: 2025-11-21 17:29Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated openssh packages that fix a potential security vulnerability and\nvarious other bugs are now available.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSH is OpenBSD\u0027s SSH (Secure SHell) protocol implementation. This\nincludes the core files necessary for both the OpenSSH client and server. \n\nA bug was found in the way the OpenSSH server handled the MaxStartups and\nLoginGraceTime configuration variables. A malicious user could connect to\nthe SSH daemon in such a way that it would prevent additional logins from\noccuring until the malicious connections are closed. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-2069 to this issue.\n\nAdditionally, the following issues are resolved with this update:\n\n- The -q option of the ssh client did not suppress the banner message sent\nby the server, which caused errors when used in scripts.\n\n- The sshd daemon failed to close the client connection if multiple X\nclients were forwarded over the connection and the client session exited.\n\n- The sftp client leaked memory if used for extended periods.\n\n- The sshd daemon called the PAM functions incorrectly if the user was\nunknown on the system.\n\nAll users of openssh should upgrade to these updated packages, which\ncontain backported patches and resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2005:550",
"url": "https://access.redhat.com/errata/RHSA-2005:550"
},
{
"category": "external",
"summary": "129289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=129289"
},
{
"category": "external",
"summary": "151080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=151080"
},
{
"category": "external",
"summary": "156996",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=156996"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_550.json"
}
],
"title": "Red Hat Security Advisory: openssh security update",
"tracking": {
"current_release_date": "2025-11-21T17:29:16+00:00",
"generator": {
"date": "2025-11-21T17:29:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2005:550",
"initial_release_date": "2005-09-28T14:32:00+00:00",
"revision_history": [
{
"date": "2005-09-28T14:32:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2005-09-28T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:29:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"product": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"product_id": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:3.6.1p2-33.30.6.ia64",
"product": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ia64",
"product_id": "openssh-clients-0:3.6.1p2-33.30.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssh-0:3.6.1p2-33.30.6.ia64",
"product": {
"name": "openssh-0:3.6.1p2-33.30.6.ia64",
"product_id": "openssh-0:3.6.1p2-33.30.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:3.6.1p2-33.30.6.ia64",
"product": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ia64",
"product_id": "openssh-server-0:3.6.1p2-33.30.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"product": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"product": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"product_id": "openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.6?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"product": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"product_id": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"product": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"product_id": "openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-0:3.6.1p2-33.30.6.x86_64",
"product": {
"name": "openssh-0:3.6.1p2-33.30.6.x86_64",
"product_id": "openssh-0:3.6.1p2-33.30.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:3.6.1p2-33.30.6.x86_64",
"product": {
"name": "openssh-server-0:3.6.1p2-33.30.6.x86_64",
"product_id": "openssh-server-0:3.6.1p2-33.30.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"product": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"product": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"product_id": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"product": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"product_id": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:3.6.1p2-33.30.6.i386",
"product": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.i386",
"product_id": "openssh-clients-0:3.6.1p2-33.30.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssh-0:3.6.1p2-33.30.6.i386",
"product": {
"name": "openssh-0:3.6.1p2-33.30.6.i386",
"product_id": "openssh-0:3.6.1p2-33.30.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:3.6.1p2-33.30.6.i386",
"product": {
"name": "openssh-server-0:3.6.1p2-33.30.6.i386",
"product_id": "openssh-server-0:3.6.1p2-33.30.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"product": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-0:3.6.1p2-33.30.6.i386",
"product": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.i386",
"product_id": "openssh-askpass-0:3.6.1p2-33.30.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.6?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-0:3.6.1p2-33.30.6.src",
"product": {
"name": "openssh-0:3.6.1p2-33.30.6.src",
"product_id": "openssh-0:3.6.1p2-33.30.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"product": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"product_id": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:3.6.1p2-33.30.6.ppc",
"product": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ppc",
"product_id": "openssh-clients-0:3.6.1p2-33.30.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssh-0:3.6.1p2-33.30.6.ppc",
"product": {
"name": "openssh-0:3.6.1p2-33.30.6.ppc",
"product_id": "openssh-0:3.6.1p2-33.30.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:3.6.1p2-33.30.6.ppc",
"product": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ppc",
"product_id": "openssh-server-0:3.6.1p2-33.30.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"product": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"product": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"product_id": "openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.6?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"product": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"product_id": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390x",
"product": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390x",
"product_id": "openssh-clients-0:3.6.1p2-33.30.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-0:3.6.1p2-33.30.6.s390x",
"product": {
"name": "openssh-0:3.6.1p2-33.30.6.s390x",
"product_id": "openssh-0:3.6.1p2-33.30.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:3.6.1p2-33.30.6.s390x",
"product": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390x",
"product_id": "openssh-server-0:3.6.1p2-33.30.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"product": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"product": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"product_id": "openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"product": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"product_id": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390",
"product": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390",
"product_id": "openssh-clients-0:3.6.1p2-33.30.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssh-0:3.6.1p2-33.30.6.s390",
"product": {
"name": "openssh-0:3.6.1p2-33.30.6.s390",
"product_id": "openssh-0:3.6.1p2-33.30.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:3.6.1p2-33.30.6.s390",
"product": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390",
"product_id": "openssh-server-0:3.6.1p2-33.30.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"product": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390",
"product": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390",
"product_id": "openssh-askpass-0:3.6.1p2-33.30.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.6?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-0:3.6.1p2-33.30.6.src"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-server-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-server-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-server-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-server-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-server-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-server-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-0:3.6.1p2-33.30.6.src"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-0:3.6.1p2-33.30.6.src"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-server-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-server-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-server-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-server-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-server-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-server-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-0:3.6.1p2-33.30.6.src"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-server-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-server-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-server-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-server-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-server-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-server-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2004-2069",
"discovery_date": "2005-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617421"
}
],
"notes": [
{
"category": "description",
"text": "sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:openssh-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-0:3.6.1p2-33.30.6.src",
"3AS:openssh-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-server-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-server-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-server-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-0:3.6.1p2-33.30.6.src",
"3Desktop:openssh-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-0:3.6.1p2-33.30.6.src",
"3ES:openssh-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-server-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-server-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-server-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-0:3.6.1p2-33.30.6.src",
"3WS:openssh-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-server-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-server-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-server-0:3.6.1p2-33.30.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2004-2069"
},
{
"category": "external",
"summary": "RHBZ#1617421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617421"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2004-2069",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-2069"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-2069",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2004-2069"
}
],
"release_date": "2004-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2005-09-28T14:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"3AS:openssh-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-0:3.6.1p2-33.30.6.src",
"3AS:openssh-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-server-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-server-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-server-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-0:3.6.1p2-33.30.6.src",
"3Desktop:openssh-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-0:3.6.1p2-33.30.6.src",
"3ES:openssh-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-server-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-server-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-server-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-0:3.6.1p2-33.30.6.src",
"3WS:openssh-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-server-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-server-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-server-0:3.6.1p2-33.30.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2005:550"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "security flaw"
}
]
}
RHSA-2005_550
Vulnerability from csaf_redhat - Published: 2005-09-28 14:32 - Updated: 2024-11-21 23:51Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated openssh packages that fix a potential security vulnerability and\nvarious other bugs are now available.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "OpenSSH is OpenBSD\u0027s SSH (Secure SHell) protocol implementation. This\nincludes the core files necessary for both the OpenSSH client and server. \n\nA bug was found in the way the OpenSSH server handled the MaxStartups and\nLoginGraceTime configuration variables. A malicious user could connect to\nthe SSH daemon in such a way that it would prevent additional logins from\noccuring until the malicious connections are closed. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-2069 to this issue.\n\nAdditionally, the following issues are resolved with this update:\n\n- The -q option of the ssh client did not suppress the banner message sent\nby the server, which caused errors when used in scripts.\n\n- The sshd daemon failed to close the client connection if multiple X\nclients were forwarded over the connection and the client session exited.\n\n- The sftp client leaked memory if used for extended periods.\n\n- The sshd daemon called the PAM functions incorrectly if the user was\nunknown on the system.\n\nAll users of openssh should upgrade to these updated packages, which\ncontain backported patches and resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2005:550",
"url": "https://access.redhat.com/errata/RHSA-2005:550"
},
{
"category": "external",
"summary": "129289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=129289"
},
{
"category": "external",
"summary": "151080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=151080"
},
{
"category": "external",
"summary": "156996",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=156996"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_550.json"
}
],
"title": "Red Hat Security Advisory: openssh security update",
"tracking": {
"current_release_date": "2024-11-21T23:51:56+00:00",
"generator": {
"date": "2024-11-21T23:51:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2005:550",
"initial_release_date": "2005-09-28T14:32:00+00:00",
"revision_history": [
{
"date": "2005-09-28T14:32:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2005-09-28T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-21T23:51:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"product": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"product_id": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:3.6.1p2-33.30.6.ia64",
"product": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ia64",
"product_id": "openssh-clients-0:3.6.1p2-33.30.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssh-0:3.6.1p2-33.30.6.ia64",
"product": {
"name": "openssh-0:3.6.1p2-33.30.6.ia64",
"product_id": "openssh-0:3.6.1p2-33.30.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:3.6.1p2-33.30.6.ia64",
"product": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ia64",
"product_id": "openssh-server-0:3.6.1p2-33.30.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"product": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"product": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"product_id": "openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.6?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"product": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"product_id": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"product": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"product_id": "openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-0:3.6.1p2-33.30.6.x86_64",
"product": {
"name": "openssh-0:3.6.1p2-33.30.6.x86_64",
"product_id": "openssh-0:3.6.1p2-33.30.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:3.6.1p2-33.30.6.x86_64",
"product": {
"name": "openssh-server-0:3.6.1p2-33.30.6.x86_64",
"product_id": "openssh-server-0:3.6.1p2-33.30.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"product": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"product": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"product_id": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"product": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"product_id": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:3.6.1p2-33.30.6.i386",
"product": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.i386",
"product_id": "openssh-clients-0:3.6.1p2-33.30.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssh-0:3.6.1p2-33.30.6.i386",
"product": {
"name": "openssh-0:3.6.1p2-33.30.6.i386",
"product_id": "openssh-0:3.6.1p2-33.30.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:3.6.1p2-33.30.6.i386",
"product": {
"name": "openssh-server-0:3.6.1p2-33.30.6.i386",
"product_id": "openssh-server-0:3.6.1p2-33.30.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"product": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-0:3.6.1p2-33.30.6.i386",
"product": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.i386",
"product_id": "openssh-askpass-0:3.6.1p2-33.30.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.6?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-0:3.6.1p2-33.30.6.src",
"product": {
"name": "openssh-0:3.6.1p2-33.30.6.src",
"product_id": "openssh-0:3.6.1p2-33.30.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"product": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"product_id": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:3.6.1p2-33.30.6.ppc",
"product": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ppc",
"product_id": "openssh-clients-0:3.6.1p2-33.30.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssh-0:3.6.1p2-33.30.6.ppc",
"product": {
"name": "openssh-0:3.6.1p2-33.30.6.ppc",
"product_id": "openssh-0:3.6.1p2-33.30.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:3.6.1p2-33.30.6.ppc",
"product": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ppc",
"product_id": "openssh-server-0:3.6.1p2-33.30.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"product": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"product": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"product_id": "openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.6?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"product": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"product_id": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390x",
"product": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390x",
"product_id": "openssh-clients-0:3.6.1p2-33.30.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-0:3.6.1p2-33.30.6.s390x",
"product": {
"name": "openssh-0:3.6.1p2-33.30.6.s390x",
"product_id": "openssh-0:3.6.1p2-33.30.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:3.6.1p2-33.30.6.s390x",
"product": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390x",
"product_id": "openssh-server-0:3.6.1p2-33.30.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"product": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"product": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"product_id": "openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"product": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"product_id": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-debuginfo@3.6.1p2-33.30.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390",
"product": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390",
"product_id": "openssh-clients-0:3.6.1p2-33.30.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-clients@3.6.1p2-33.30.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssh-0:3.6.1p2-33.30.6.s390",
"product": {
"name": "openssh-0:3.6.1p2-33.30.6.s390",
"product_id": "openssh-0:3.6.1p2-33.30.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh@3.6.1p2-33.30.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssh-server-0:3.6.1p2-33.30.6.s390",
"product": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390",
"product_id": "openssh-server-0:3.6.1p2-33.30.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-server@3.6.1p2-33.30.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"product": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"product_id": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.6.1p2-33.30.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390",
"product": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390",
"product_id": "openssh-askpass-0:3.6.1p2-33.30.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/openssh-askpass@3.6.1p2-33.30.6?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-0:3.6.1p2-33.30.6.src"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-clients-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-server-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-server-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-server-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-server-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-server-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:openssh-server-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-0:3.6.1p2-33.30.6.src"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-clients-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:openssh-server-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-0:3.6.1p2-33.30.6.src"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-clients-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-server-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-server-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-server-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-server-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-server-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:openssh-server-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-0:3.6.1p2-33.30.6.src"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-clients-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-clients-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-server-0:3.6.1p2-33.30.6.i386"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-server-0:3.6.1p2-33.30.6.ia64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-server-0:3.6.1p2-33.30.6.ppc"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-server-0:3.6.1p2-33.30.6.s390"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-server-0:3.6.1p2-33.30.6.s390x"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssh-server-0:3.6.1p2-33.30.6.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:openssh-server-0:3.6.1p2-33.30.6.x86_64"
},
"product_reference": "openssh-server-0:3.6.1p2-33.30.6.x86_64",
"relates_to_product_reference": "3WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2004-2069",
"discovery_date": "2005-05-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617421"
}
],
"notes": [
{
"category": "description",
"text": "sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:openssh-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-0:3.6.1p2-33.30.6.src",
"3AS:openssh-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-server-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-server-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-server-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-0:3.6.1p2-33.30.6.src",
"3Desktop:openssh-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-0:3.6.1p2-33.30.6.src",
"3ES:openssh-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-server-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-server-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-server-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-0:3.6.1p2-33.30.6.src",
"3WS:openssh-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-server-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-server-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-server-0:3.6.1p2-33.30.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2004-2069"
},
{
"category": "external",
"summary": "RHBZ#1617421",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617421"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2004-2069",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-2069"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-2069",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2004-2069"
}
],
"release_date": "2004-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2005-09-28T14:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"3AS:openssh-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-0:3.6.1p2-33.30.6.src",
"3AS:openssh-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3AS:openssh-server-0:3.6.1p2-33.30.6.i386",
"3AS:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3AS:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3AS:openssh-server-0:3.6.1p2-33.30.6.s390",
"3AS:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3AS:openssh-server-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-0:3.6.1p2-33.30.6.src",
"3Desktop:openssh-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.i386",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.s390",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3Desktop:openssh-server-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-0:3.6.1p2-33.30.6.src",
"3ES:openssh-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3ES:openssh-server-0:3.6.1p2-33.30.6.i386",
"3ES:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3ES:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3ES:openssh-server-0:3.6.1p2-33.30.6.s390",
"3ES:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3ES:openssh-server-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-0:3.6.1p2-33.30.6.src",
"3WS:openssh-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-askpass-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-askpass-gnome-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-clients-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-debuginfo-0:3.6.1p2-33.30.6.x86_64",
"3WS:openssh-server-0:3.6.1p2-33.30.6.i386",
"3WS:openssh-server-0:3.6.1p2-33.30.6.ia64",
"3WS:openssh-server-0:3.6.1p2-33.30.6.ppc",
"3WS:openssh-server-0:3.6.1p2-33.30.6.s390",
"3WS:openssh-server-0:3.6.1p2-33.30.6.s390x",
"3WS:openssh-server-0:3.6.1p2-33.30.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2005:550"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "security flaw"
}
]
}
FKIE_CVE-2004-2069
Vulnerability from fkie_nvd - Published: 2004-12-31 05:00 - Updated: 2025-04-03 01:03| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://marc.info/?l=openssh-unix-dev&m=107520317020444&w=2 | ||
| secalert@redhat.com | http://marc.info/?l=openssh-unix-dev&m=107529205602320&w=2 | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2005-550.html | ||
| secalert@redhat.com | http://secunia.com/advisories/17000 | ||
| secalert@redhat.com | http://secunia.com/advisories/17135 | ||
| secalert@redhat.com | http://secunia.com/advisories/17252 | ||
| secalert@redhat.com | http://secunia.com/advisories/22875 | ||
| secalert@redhat.com | http://secunia.com/advisories/23680 | ||
| secalert@redhat.com | http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf | ||
| secalert@redhat.com | http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf | ||
| secalert@redhat.com | http://www.osvdb.org/16567 | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/425397/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/451404/100/0/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/451417/100/200/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/archive/1/451426/100/200/threaded | ||
| secalert@redhat.com | http://www.securityfocus.com/bid/14963 | ||
| secalert@redhat.com | http://www.vmware.com/download/esx/esx-202-200610-patch.html | ||
| secalert@redhat.com | http://www.vmware.com/download/esx/esx-213-200610-patch.html | ||
| secalert@redhat.com | http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html | ||
| secalert@redhat.com | http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html | ||
| secalert@redhat.com | http://www.vupen.com/english/advisories/2006/4502 | ||
| secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/20930 | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11541 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=openssh-unix-dev&m=107520317020444&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=openssh-unix-dev&m=107529205602320&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2005-550.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17000 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17135 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17252 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/22875 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/23680 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/16567 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/425397/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/451404/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/451417/100/200/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/451426/100/200/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/14963 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/download/esx/esx-202-200610-patch.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/download/esx/esx-213-200610-patch.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/4502 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/20930 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11541 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openbsd:openssh:3.6.1p2:*:*:*:*:*:*:*",
"matchCriteriaId": "A02751E9-2D38-4495-9572-8D84D71D4773",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openbsd:openssh:3.7.1p2:*:*:*:*:*:*:*",
"matchCriteriaId": "44CCF5CD-B434-4392-A79A-C1945D2AE30A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption)."
}
],
"id": "CVE-2004-2069",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-12-31T05:00:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=openssh-unix-dev\u0026m=107520317020444\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=openssh-unix-dev\u0026m=107529205602320\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2005-550.html"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/17000"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/17135"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/17252"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/22875"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/23680"
},
{
"source": "secalert@redhat.com",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf"
},
{
"source": "secalert@redhat.com",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf"
},
{
"source": "secalert@redhat.com",
"url": "http://www.osvdb.org/16567"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/425397/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/451404/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/451417/100/200/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/archive/1/451426/100/200/threaded"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/14963"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vmware.com/download/esx/esx-202-200610-patch.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vmware.com/download/esx/esx-213-200610-patch.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2006/4502"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20930"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11541"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=openssh-unix-dev\u0026m=107520317020444\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=openssh-unix-dev\u0026m=107529205602320\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2005-550.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/17000"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/17135"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/17252"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/22875"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/23680"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-216.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2005-223.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/16567"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/425397/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/451404/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/451417/100/200/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/451426/100/200/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/14963"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/download/esx/esx-202-200610-patch.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/download/esx/esx-213-200610-patch.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/4502"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20930"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11541"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.