Action not permitted
Modal body text goes here.
cve-2014-2532
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:14:26.611Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "59855", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59855" }, { "name": "57574", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57574" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0143.html" }, { "name": "APPLE-SA-2015-09-30-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "name": "HPSBUX03188", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576985122836\u0026w=2" }, { "name": "SSRT101487", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576985122836\u0026w=2" }, { "name": "57488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57488" }, { "name": "MDVSA-2015:095", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:095" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "59313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59313" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT205267" }, { "name": "FEDORA-2014-6380", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html" }, { "name": "DSA-2894", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2894" }, { "name": "RHSA-2014:1552", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1552.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc" }, { "name": "1029925", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029925" }, { "name": "[security-announce] 20140315 Announce: OpenSSH 6.6 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=openbsd-security-announce\u0026m=139492048027313\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "name": "USN-2155-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2155-1" }, { "name": "FEDORA-2014-6569", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html" }, { "name": "openssh-cve20142532-sec-bypass(91986)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91986" }, { "name": "MDVSA-2014:068", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:068" }, { "name": "66355", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/66355" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "59855", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59855" }, { "name": "57574", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57574" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0143.html" }, { "name": "APPLE-SA-2015-09-30-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "name": "HPSBUX03188", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576985122836\u0026w=2" }, { "name": "SSRT101487", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=141576985122836\u0026w=2" }, { "name": "57488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57488" }, { "name": "MDVSA-2015:095", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:095" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "59313", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59313" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT205267" }, { "name": "FEDORA-2014-6380", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html" }, { "name": "DSA-2894", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2894" }, { "name": "RHSA-2014:1552", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1552.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc" }, { "name": "1029925", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029925" }, { "name": "[security-announce] 20140315 Announce: OpenSSH 6.6 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=openbsd-security-announce\u0026m=139492048027313\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "name": "USN-2155-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2155-1" }, { "name": "FEDORA-2014-6569", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html" }, { "name": "openssh-cve20142532-sec-bypass(91986)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91986" }, { "name": "MDVSA-2014:068", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:068" }, { "name": "66355", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/66355" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2532", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "59855", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59855" }, { "name": "57574", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57574" }, { "name": "http://advisories.mageia.org/MGASA-2014-0143.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0143.html" }, { "name": "APPLE-SA-2015-09-30-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "name": "HPSBUX03188", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141576985122836\u0026w=2" }, { "name": "SSRT101487", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141576985122836\u0026w=2" }, { "name": "57488", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57488" }, { "name": "MDVSA-2015:095", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:095" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "59313", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59313" }, { "name": "https://support.apple.com/HT205267", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205267" }, { "name": "FEDORA-2014-6380", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html" }, { "name": "DSA-2894", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2894" }, { "name": "RHSA-2014:1552", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1552.html" }, { "name": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc", "refsource": "CONFIRM", "url": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc" }, { "name": "1029925", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029925" }, { "name": "[security-announce] 20140315 Announce: OpenSSH 6.6 released", "refsource": "MLIST", "url": "http://marc.info/?l=openbsd-security-announce\u0026m=139492048027313\u0026w=2" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "name": "USN-2155-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2155-1" }, { "name": "FEDORA-2014-6569", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html" }, { "name": "openssh-cve20142532-sec-bypass(91986)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91986" }, { "name": "MDVSA-2014:068", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:068" }, { "name": "66355", "refsource": "BID", "url": "http://www.securityfocus.com/bid/66355" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2532", "datePublished": "2014-03-18T01:00:00", "dateReserved": "2014-03-17T00:00:00", "dateUpdated": "2024-08-06T10:14:26.611Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-2532\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-03-18T05:18:19.000\",\"lastModified\":\"2018-07-19T01:29:01.077\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.\"},{\"lang\":\"es\",\"value\":\"sshd en OpenSSH anterior a 6.6 no soporta debidamente comodines en l\u00edneas AcceptEnv en sshd_config, lo que permite a atacantes remotos evadir restricciones de entorno mediante el uso de una subcadena localizada antes de un caracter de comod\u00edn.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.9,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_user_data_repository:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0473C6C9-B0C5-43F0-AC8C-C0DAD30DACF8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.5\",\"matchCriteriaId\":\"87697D9A-08E0-462D-ABAC-71A48036CE69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9754B4A-3042-49B8-86F7-2D60E25400C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3872787F-2C1C-40C0-B9CF-A3C0CEAAB400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39D1E296-3040-4CC9-B95B-3E07D73F1150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCEE2677-16EE-484F-B2FB-FCA377E0D76B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90798B9A-A1C6-4EC5-96BF-AF9C6FEFB63D\"}]}]}],\"references\":[{\"url\":\"http://advisories.mageia.org/MGASA-2014-0143.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141576985122836\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=openbsd-security-announce\u0026m=139492048027313\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1552.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/57488\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/57574\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/59313\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/59855\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2894\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2014:068\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:095\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/66355\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1029925\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2155-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/91986\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.apple.com/HT205267\",\"source\":\"cve@mitre.org\"}]}}" } }
rhsa-2014_1552
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssh packages that fix two security issues, several bugs, and\nadd various enhancements are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is OpenBSD\u0027s SSH (Secure Shell) protocol implementation.\nThese packages include the core files necessary for both the OpenSSH client\nand server.\n\nIt was discovered that OpenSSH clients did not correctly verify DNS SSHFP\nrecords. A malicious server could use this flaw to force a connecting\nclient to skip the DNS SSHFP record check and require the user to perform\nmanual host verification of the DNS SSHFP record. (CVE-2014-2653)\n\nIt was found that OpenSSH did not properly handle certain AcceptEnv\nparameter values with wildcard characters. A remote attacker could use this\nflaw to bypass intended environment variable restrictions. (CVE-2014-2532)\n\nThis update also fixes the following bugs:\n\n* Based on the SP800-131A information security standard, the generation of\na digital signature using the Digital Signature Algorithm (DSA) with the\nkey size of 1024 bits and RSA with the key size of less than 2048 bits is\ndisallowed after the year 2013. After this update, ssh-keygen no longer\ngenerates keys with less than 2048 bits in FIPS mode. However, the sshd\nservice accepts keys of size 1024 bits as well as larger keys for\ncompatibility reasons. (BZ#993580)\n\n* Previously, the openssh utility incorrectly set the oom_adj value to -17\nfor all of its children processes. This behavior was incorrect because the\nchildren processes were supposed to have this value set to 0. This update\napplies a patch to fix this bug and oom_adj is now properly set to 0 for\nall children processes as expected. (BZ#1010429)\n\n* Previously, if the sshd service failed to verify the checksum of an\ninstalled FIPS module using the fipscheck library, the information about\nthis failure was only provided at the standard error output of sshd. As a\nconsequence, the user could not notice this message and be uninformed when\na system had not been properly configured for FIPS mode. To fix this bug,\nthis behavior has been changed and sshd now sends such messages via the\nsyslog service. (BZ#1020803)\n\n* When keys provided by the pkcs11 library were removed from the ssh agent\nusing the \"ssh-add -e\" command, the user was prompted to enter a PIN.\nWith this update, a patch has been applied to allow the user to remove the\nkeys provided by pkcs11 without the PIN. (BZ#1042519)\n\nIn addition, this update adds the following enhancements:\n\n* With this update, ControlPersist has been added to OpenSSH. The option in\nconjunction with the ControlMaster configuration directive specifies that\nthe master connection remains open in the background after the initial\nclient connection has been closed. (BZ#953088)\n\n* When the sshd daemon is configured to force the internal SFTP session,\nand the user attempts to use a connection other than SFTP, the appropriate\nmessage is logged to the /var/log/secure file. (BZ#997377)\n\n* Support for Elliptic Curve Cryptography modes for key exchange (ECDH) and\nhost user keys (ECDSA) as specified by RFC5656 has been added to the\nopenssh packages. However, they are not enabled by default and the user has\nto enable them manually. For more information on how to configure ECDSA and\nECDH with OpenSSH, see: https://access.redhat.com/solutions/711953\n(BZ#1028335)\n\nAll openssh users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add these\nenhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1552", "url": "https://access.redhat.com/errata/RHSA-2014:1552" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/solutions/711953", "url": "https://access.redhat.com/solutions/711953" }, { "category": "external", "summary": "953088", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953088" }, { "category": "external", "summary": "1010429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010429" }, { "category": "external", "summary": "1023043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023043" }, { "category": "external", "summary": "1023044", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1023044" }, { "category": "external", "summary": "1027197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027197" }, { "category": "external", "summary": "1028643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1028643" }, { "category": "external", "summary": "1077843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077843" }, { "category": "external", "summary": "1081338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081338" }, { "category": "external", "summary": "1108836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108836" }, { "category": "external", "summary": "1111568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1111568" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1552.json" } ], "title": "Red Hat Security Advisory: openssh security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-05T18:37:10+00:00", "generator": { "date": "2024-11-05T18:37:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2014:1552", "initial_release_date": "2014-10-13T21:21:23+00:00", "revision_history": [ { "date": "2014-10-13T21:21:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-10-13T21:21:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:37:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "product_id": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-104.el6?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:5.3p1-104.el6.s390x", "product": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390x", "product_id": "openssh-debuginfo-0:5.3p1-104.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@5.3p1-104.el6?arch=s390x" } } }, { "category": "product_version", "name": "openssh-ldap-0:5.3p1-104.el6.s390x", "product": { "name": "openssh-ldap-0:5.3p1-104.el6.s390x", "product_id": "openssh-ldap-0:5.3p1-104.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@5.3p1-104.el6?arch=s390x" } } }, { "category": "product_version", "name": "openssh-0:5.3p1-104.el6.s390x", "product": { "name": "openssh-0:5.3p1-104.el6.s390x", "product_id": "openssh-0:5.3p1-104.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@5.3p1-104.el6?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:5.3p1-104.el6.s390x", "product": { "name": "openssh-clients-0:5.3p1-104.el6.s390x", "product_id": "openssh-clients-0:5.3p1-104.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@5.3p1-104.el6?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:5.3p1-104.el6.s390x", "product": { "name": "openssh-server-0:5.3p1-104.el6.s390x", "product_id": "openssh-server-0:5.3p1-104.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@5.3p1-104.el6?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-0:5.3p1-104.el6.s390x", "product": { "name": "openssh-askpass-0:5.3p1-104.el6.s390x", "product_id": "openssh-askpass-0:5.3p1-104.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@5.3p1-104.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "product_id": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-104.el6?arch=s390" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:5.3p1-104.el6.s390", "product": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390", "product_id": "openssh-debuginfo-0:5.3p1-104.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@5.3p1-104.el6?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "product_id": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-104.el6?arch=ppc" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc", "product": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc", "product_id": "openssh-debuginfo-0:5.3p1-104.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@5.3p1-104.el6?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "product_id": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-104.el6?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc64", "product": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc64", "product_id": "openssh-debuginfo-0:5.3p1-104.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@5.3p1-104.el6?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-ldap-0:5.3p1-104.el6.ppc64", "product": { "name": "openssh-ldap-0:5.3p1-104.el6.ppc64", "product_id": "openssh-ldap-0:5.3p1-104.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@5.3p1-104.el6?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-0:5.3p1-104.el6.ppc64", "product": { "name": "openssh-0:5.3p1-104.el6.ppc64", "product_id": "openssh-0:5.3p1-104.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@5.3p1-104.el6?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-clients-0:5.3p1-104.el6.ppc64", "product": { "name": "openssh-clients-0:5.3p1-104.el6.ppc64", "product_id": "openssh-clients-0:5.3p1-104.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@5.3p1-104.el6?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-server-0:5.3p1-104.el6.ppc64", "product": { "name": "openssh-server-0:5.3p1-104.el6.ppc64", "product_id": "openssh-server-0:5.3p1-104.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@5.3p1-104.el6?arch=ppc64" } } }, { "category": "product_version", "name": "openssh-askpass-0:5.3p1-104.el6.ppc64", "product": { "name": "openssh-askpass-0:5.3p1-104.el6.ppc64", "product_id": "openssh-askpass-0:5.3p1-104.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@5.3p1-104.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "product_id": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-104.el6?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:5.3p1-104.el6.x86_64", "product": { "name": "openssh-debuginfo-0:5.3p1-104.el6.x86_64", "product_id": "openssh-debuginfo-0:5.3p1-104.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@5.3p1-104.el6?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-ldap-0:5.3p1-104.el6.x86_64", "product": { "name": "openssh-ldap-0:5.3p1-104.el6.x86_64", "product_id": "openssh-ldap-0:5.3p1-104.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@5.3p1-104.el6?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-0:5.3p1-104.el6.x86_64", "product": { "name": "openssh-0:5.3p1-104.el6.x86_64", "product_id": "openssh-0:5.3p1-104.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@5.3p1-104.el6?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:5.3p1-104.el6.x86_64", "product": { "name": "openssh-clients-0:5.3p1-104.el6.x86_64", "product_id": "openssh-clients-0:5.3p1-104.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@5.3p1-104.el6?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:5.3p1-104.el6.x86_64", "product": { "name": "openssh-server-0:5.3p1-104.el6.x86_64", "product_id": "openssh-server-0:5.3p1-104.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@5.3p1-104.el6?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-0:5.3p1-104.el6.x86_64", "product": { "name": "openssh-askpass-0:5.3p1-104.el6.x86_64", "product_id": "openssh-askpass-0:5.3p1-104.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@5.3p1-104.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "product": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "product_id": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/pam_ssh_agent_auth@0.9.3-104.el6?arch=i686" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:5.3p1-104.el6.i686", "product": { "name": "openssh-debuginfo-0:5.3p1-104.el6.i686", "product_id": "openssh-debuginfo-0:5.3p1-104.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@5.3p1-104.el6?arch=i686" } } }, { "category": "product_version", "name": "openssh-ldap-0:5.3p1-104.el6.i686", "product": { "name": "openssh-ldap-0:5.3p1-104.el6.i686", "product_id": "openssh-ldap-0:5.3p1-104.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-ldap@5.3p1-104.el6?arch=i686" } } }, { "category": "product_version", "name": "openssh-0:5.3p1-104.el6.i686", "product": { "name": "openssh-0:5.3p1-104.el6.i686", "product_id": "openssh-0:5.3p1-104.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@5.3p1-104.el6?arch=i686" } } }, { "category": "product_version", "name": "openssh-clients-0:5.3p1-104.el6.i686", "product": { "name": "openssh-clients-0:5.3p1-104.el6.i686", "product_id": "openssh-clients-0:5.3p1-104.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@5.3p1-104.el6?arch=i686" } } }, { "category": "product_version", "name": "openssh-server-0:5.3p1-104.el6.i686", "product": { "name": "openssh-server-0:5.3p1-104.el6.i686", "product_id": "openssh-server-0:5.3p1-104.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@5.3p1-104.el6?arch=i686" } } }, { "category": "product_version", "name": "openssh-askpass-0:5.3p1-104.el6.i686", "product": { "name": "openssh-askpass-0:5.3p1-104.el6.i686", "product_id": "openssh-askpass-0:5.3p1-104.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@5.3p1-104.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssh-0:5.3p1-104.el6.src", "product": { "name": "openssh-0:5.3p1-104.el6.src", "product_id": "openssh-0:5.3p1-104.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@5.3p1-104.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-0:5.3p1-104.el6.src" }, "product_reference": "openssh-0:5.3p1-104.el6.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-askpass-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-askpass-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-askpass-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-askpass-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-clients-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-clients-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-clients-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-clients-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-ldap-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-ldap-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-ldap-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-ldap-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-server-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-server-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-server-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:openssh-server-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-0:5.3p1-104.el6.src" }, "product_reference": "openssh-0:5.3p1-104.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-askpass-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-askpass-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-askpass-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-askpass-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-clients-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-clients-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-clients-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-clients-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-debuginfo-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-debuginfo-0:5.3p1-104.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-debuginfo-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-debuginfo-0:5.3p1-104.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-debuginfo-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-debuginfo-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-ldap-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-ldap-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-ldap-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-ldap-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-server-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-server-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-server-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:openssh-server-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-0:5.3p1-104.el6.src" }, "product_reference": "openssh-0:5.3p1-104.el6.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-0:5.3p1-104.el6.src" }, "product_reference": "openssh-0:5.3p1-104.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-clients-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-clients-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-clients-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-clients-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-server-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-server-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-server-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:openssh-server-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-0:5.3p1-104.el6.src" }, "product_reference": "openssh-0:5.3p1-104.el6.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-askpass-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-askpass-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-askpass-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-askpass-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-clients-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-clients-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-clients-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-clients-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-ldap-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-ldap-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-ldap-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-ldap-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-server-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-server-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-server-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:openssh-server-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-0:5.3p1-104.el6.src" }, "product_reference": "openssh-0:5.3p1-104.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-askpass-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-askpass-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-askpass-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-askpass-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-clients-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-clients-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-clients-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-clients-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-debuginfo-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-debuginfo-0:5.3p1-104.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-debuginfo-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-debuginfo-0:5.3p1-104.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-debuginfo-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-debuginfo-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-ldap-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-ldap-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-ldap-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-ldap-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-server-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-server-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-server-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:openssh-server-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-0:5.3p1-104.el6.src" }, "product_reference": "openssh-0:5.3p1-104.el6.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-server-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-server-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-server-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:openssh-server-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-0:5.3p1-104.el6.src" }, "product_reference": "openssh-0:5.3p1-104.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-askpass-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-askpass-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-askpass-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-askpass-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-askpass-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-clients-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-clients-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-clients-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-clients-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-clients-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.ppc" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.s390" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-debuginfo-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-ldap-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-ldap-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-ldap-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-ldap-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-ldap-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-ldap-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-server-0:5.3p1-104.el6.i686" }, "product_reference": "openssh-server-0:5.3p1-104.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-server-0:5.3p1-104.el6.ppc64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-server-0:5.3p1-104.el6.s390x" }, "product_reference": "openssh-server-0:5.3p1-104.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:5.3p1-104.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:openssh-server-0:5.3p1-104.el6.x86_64" }, "product_reference": "openssh-server-0:5.3p1-104.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.i686" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.s390" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64" }, "product_reference": "pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-2532", "cwe": { "id": "CWE-138", "name": "Improper Neutralization of Special Elements" }, "discovery_date": "2014-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1077843" } ], "notes": [ { "category": "description", "text": "It was found that OpenSSH did not properly handle certain AcceptEnv parameter values with wildcard characters. A remote attacker could use this flaw to bypass intended environment variable restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh: AcceptEnv environment restriction bypass flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of openssh as shipped with Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this issue as having Low security impact. This issue is not planned to be fixed in Red Hat Enterprise Linux 5 as it is now in Production 3 Phase of the support and maintenance life cycle, https://access.redhat.com/support/policy/updates/errata/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:openssh-0:5.3p1-104.el6.i686", "6Client-optional:openssh-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-0:5.3p1-104.el6.src", "6Client-optional:openssh-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-104.el6.i686", "6Client-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Client:openssh-0:5.3p1-104.el6.i686", "6Client:openssh-0:5.3p1-104.el6.ppc64", "6Client:openssh-0:5.3p1-104.el6.s390x", "6Client:openssh-0:5.3p1-104.el6.src", "6Client:openssh-0:5.3p1-104.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-104.el6.i686", "6Client:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-104.el6.s390x", "6Client:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Client:openssh-clients-0:5.3p1-104.el6.i686", "6Client:openssh-clients-0:5.3p1-104.el6.ppc64", "6Client:openssh-clients-0:5.3p1-104.el6.s390x", "6Client:openssh-clients-0:5.3p1-104.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-104.el6.i686", "6Client:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-104.el6.s390x", "6Client:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Client:openssh-server-0:5.3p1-104.el6.i686", "6Client:openssh-server-0:5.3p1-104.el6.ppc64", "6Client:openssh-server-0:5.3p1-104.el6.s390x", "6Client:openssh-server-0:5.3p1-104.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-0:5.3p1-104.el6.src", "6ComputeNode:openssh-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-104.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Server-optional:openssh-0:5.3p1-104.el6.i686", "6Server-optional:openssh-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-0:5.3p1-104.el6.src", "6Server-optional:openssh-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-104.el6.i686", "6Server-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Server:openssh-0:5.3p1-104.el6.i686", "6Server:openssh-0:5.3p1-104.el6.ppc64", "6Server:openssh-0:5.3p1-104.el6.s390x", "6Server:openssh-0:5.3p1-104.el6.src", "6Server:openssh-0:5.3p1-104.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-104.el6.i686", "6Server:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-104.el6.s390x", "6Server:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Server:openssh-clients-0:5.3p1-104.el6.i686", "6Server:openssh-clients-0:5.3p1-104.el6.ppc64", "6Server:openssh-clients-0:5.3p1-104.el6.s390x", "6Server:openssh-clients-0:5.3p1-104.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-104.el6.i686", "6Server:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-104.el6.s390x", "6Server:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Server:openssh-server-0:5.3p1-104.el6.i686", "6Server:openssh-server-0:5.3p1-104.el6.ppc64", "6Server:openssh-server-0:5.3p1-104.el6.s390x", "6Server:openssh-server-0:5.3p1-104.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-104.el6.src", "6Workstation-optional:openssh-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Workstation:openssh-0:5.3p1-104.el6.i686", "6Workstation:openssh-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-0:5.3p1-104.el6.s390x", "6Workstation:openssh-0:5.3p1-104.el6.src", "6Workstation:openssh-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-104.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-104.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-104.el6.i686", "6Workstation:openssh-clients-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-104.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-104.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-104.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-104.el6.i686", "6Workstation:openssh-server-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-104.el6.s390x", "6Workstation:openssh-server-0:5.3p1-104.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-2532" }, { "category": "external", "summary": "RHBZ#1077843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077843" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-2532", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2532" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-2532", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-2532" } ], "release_date": "2014-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-13T21:21:23+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional:openssh-0:5.3p1-104.el6.i686", "6Client-optional:openssh-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-0:5.3p1-104.el6.src", "6Client-optional:openssh-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-104.el6.i686", "6Client-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Client:openssh-0:5.3p1-104.el6.i686", "6Client:openssh-0:5.3p1-104.el6.ppc64", "6Client:openssh-0:5.3p1-104.el6.s390x", "6Client:openssh-0:5.3p1-104.el6.src", "6Client:openssh-0:5.3p1-104.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-104.el6.i686", "6Client:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-104.el6.s390x", "6Client:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Client:openssh-clients-0:5.3p1-104.el6.i686", "6Client:openssh-clients-0:5.3p1-104.el6.ppc64", "6Client:openssh-clients-0:5.3p1-104.el6.s390x", "6Client:openssh-clients-0:5.3p1-104.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-104.el6.i686", "6Client:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-104.el6.s390x", "6Client:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Client:openssh-server-0:5.3p1-104.el6.i686", "6Client:openssh-server-0:5.3p1-104.el6.ppc64", "6Client:openssh-server-0:5.3p1-104.el6.s390x", "6Client:openssh-server-0:5.3p1-104.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-0:5.3p1-104.el6.src", "6ComputeNode:openssh-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-104.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Server-optional:openssh-0:5.3p1-104.el6.i686", "6Server-optional:openssh-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-0:5.3p1-104.el6.src", "6Server-optional:openssh-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-104.el6.i686", "6Server-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Server:openssh-0:5.3p1-104.el6.i686", "6Server:openssh-0:5.3p1-104.el6.ppc64", "6Server:openssh-0:5.3p1-104.el6.s390x", "6Server:openssh-0:5.3p1-104.el6.src", "6Server:openssh-0:5.3p1-104.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-104.el6.i686", "6Server:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-104.el6.s390x", "6Server:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Server:openssh-clients-0:5.3p1-104.el6.i686", "6Server:openssh-clients-0:5.3p1-104.el6.ppc64", "6Server:openssh-clients-0:5.3p1-104.el6.s390x", "6Server:openssh-clients-0:5.3p1-104.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-104.el6.i686", "6Server:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-104.el6.s390x", "6Server:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Server:openssh-server-0:5.3p1-104.el6.i686", "6Server:openssh-server-0:5.3p1-104.el6.ppc64", "6Server:openssh-server-0:5.3p1-104.el6.s390x", "6Server:openssh-server-0:5.3p1-104.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-104.el6.src", "6Workstation-optional:openssh-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Workstation:openssh-0:5.3p1-104.el6.i686", "6Workstation:openssh-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-0:5.3p1-104.el6.s390x", "6Workstation:openssh-0:5.3p1-104.el6.src", "6Workstation:openssh-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-104.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-104.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-104.el6.i686", "6Workstation:openssh-clients-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-104.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-104.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-104.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-104.el6.i686", "6Workstation:openssh-server-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-104.el6.s390x", "6Workstation:openssh-server-0:5.3p1-104.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-optional:openssh-0:5.3p1-104.el6.i686", "6Client-optional:openssh-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-0:5.3p1-104.el6.src", "6Client-optional:openssh-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-104.el6.i686", "6Client-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Client:openssh-0:5.3p1-104.el6.i686", "6Client:openssh-0:5.3p1-104.el6.ppc64", "6Client:openssh-0:5.3p1-104.el6.s390x", "6Client:openssh-0:5.3p1-104.el6.src", "6Client:openssh-0:5.3p1-104.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-104.el6.i686", "6Client:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-104.el6.s390x", "6Client:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Client:openssh-clients-0:5.3p1-104.el6.i686", "6Client:openssh-clients-0:5.3p1-104.el6.ppc64", "6Client:openssh-clients-0:5.3p1-104.el6.s390x", "6Client:openssh-clients-0:5.3p1-104.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-104.el6.i686", "6Client:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-104.el6.s390x", "6Client:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Client:openssh-server-0:5.3p1-104.el6.i686", "6Client:openssh-server-0:5.3p1-104.el6.ppc64", "6Client:openssh-server-0:5.3p1-104.el6.s390x", "6Client:openssh-server-0:5.3p1-104.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-0:5.3p1-104.el6.src", "6ComputeNode:openssh-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-104.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Server-optional:openssh-0:5.3p1-104.el6.i686", "6Server-optional:openssh-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-0:5.3p1-104.el6.src", "6Server-optional:openssh-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-104.el6.i686", "6Server-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Server:openssh-0:5.3p1-104.el6.i686", "6Server:openssh-0:5.3p1-104.el6.ppc64", "6Server:openssh-0:5.3p1-104.el6.s390x", "6Server:openssh-0:5.3p1-104.el6.src", "6Server:openssh-0:5.3p1-104.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-104.el6.i686", "6Server:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-104.el6.s390x", "6Server:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Server:openssh-clients-0:5.3p1-104.el6.i686", "6Server:openssh-clients-0:5.3p1-104.el6.ppc64", "6Server:openssh-clients-0:5.3p1-104.el6.s390x", "6Server:openssh-clients-0:5.3p1-104.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-104.el6.i686", "6Server:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-104.el6.s390x", "6Server:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Server:openssh-server-0:5.3p1-104.el6.i686", "6Server:openssh-server-0:5.3p1-104.el6.ppc64", "6Server:openssh-server-0:5.3p1-104.el6.s390x", "6Server:openssh-server-0:5.3p1-104.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-104.el6.src", "6Workstation-optional:openssh-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Workstation:openssh-0:5.3p1-104.el6.i686", "6Workstation:openssh-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-0:5.3p1-104.el6.s390x", "6Workstation:openssh-0:5.3p1-104.el6.src", "6Workstation:openssh-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-104.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-104.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-104.el6.i686", "6Workstation:openssh-clients-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-104.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-104.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-104.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-104.el6.i686", "6Workstation:openssh-server-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-104.el6.s390x", "6Workstation:openssh-server-0:5.3p1-104.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssh: AcceptEnv environment restriction bypass flaw" }, { "cve": "CVE-2014-2653", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2014-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1081338" } ], "notes": [ { "category": "description", "text": "It was discovered that OpenSSH clients did not correctly verify DNS SSHFP records. A malicious server could use this flaw to force a connecting client to skip the DNS SSHFP record check and require the user to perform manual host verification of the DNS SSHFP record.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh: failure to check DNS SSHFP records in certain scenarios", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Security Response Team has rated this issue as having Moderate security impact. This issue is not planned to be fixed in Red Hat Enterprise Linux 5 as it is now in Production 3 Phase of the support and maintenance life cycle, https://access.redhat.com/support/policy/updates/errata/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:openssh-0:5.3p1-104.el6.i686", "6Client-optional:openssh-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-0:5.3p1-104.el6.src", "6Client-optional:openssh-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-104.el6.i686", "6Client-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Client:openssh-0:5.3p1-104.el6.i686", "6Client:openssh-0:5.3p1-104.el6.ppc64", "6Client:openssh-0:5.3p1-104.el6.s390x", "6Client:openssh-0:5.3p1-104.el6.src", "6Client:openssh-0:5.3p1-104.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-104.el6.i686", "6Client:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-104.el6.s390x", "6Client:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Client:openssh-clients-0:5.3p1-104.el6.i686", "6Client:openssh-clients-0:5.3p1-104.el6.ppc64", "6Client:openssh-clients-0:5.3p1-104.el6.s390x", "6Client:openssh-clients-0:5.3p1-104.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-104.el6.i686", "6Client:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-104.el6.s390x", "6Client:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Client:openssh-server-0:5.3p1-104.el6.i686", "6Client:openssh-server-0:5.3p1-104.el6.ppc64", "6Client:openssh-server-0:5.3p1-104.el6.s390x", "6Client:openssh-server-0:5.3p1-104.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-0:5.3p1-104.el6.src", "6ComputeNode:openssh-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-104.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Server-optional:openssh-0:5.3p1-104.el6.i686", "6Server-optional:openssh-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-0:5.3p1-104.el6.src", "6Server-optional:openssh-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-104.el6.i686", "6Server-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Server:openssh-0:5.3p1-104.el6.i686", "6Server:openssh-0:5.3p1-104.el6.ppc64", "6Server:openssh-0:5.3p1-104.el6.s390x", "6Server:openssh-0:5.3p1-104.el6.src", "6Server:openssh-0:5.3p1-104.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-104.el6.i686", "6Server:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-104.el6.s390x", "6Server:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Server:openssh-clients-0:5.3p1-104.el6.i686", "6Server:openssh-clients-0:5.3p1-104.el6.ppc64", "6Server:openssh-clients-0:5.3p1-104.el6.s390x", "6Server:openssh-clients-0:5.3p1-104.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-104.el6.i686", "6Server:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-104.el6.s390x", "6Server:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Server:openssh-server-0:5.3p1-104.el6.i686", "6Server:openssh-server-0:5.3p1-104.el6.ppc64", "6Server:openssh-server-0:5.3p1-104.el6.s390x", "6Server:openssh-server-0:5.3p1-104.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-104.el6.src", "6Workstation-optional:openssh-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Workstation:openssh-0:5.3p1-104.el6.i686", "6Workstation:openssh-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-0:5.3p1-104.el6.s390x", "6Workstation:openssh-0:5.3p1-104.el6.src", "6Workstation:openssh-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-104.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-104.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-104.el6.i686", "6Workstation:openssh-clients-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-104.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-104.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-104.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-104.el6.i686", "6Workstation:openssh-server-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-104.el6.s390x", "6Workstation:openssh-server-0:5.3p1-104.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-2653" }, { "category": "external", "summary": "RHBZ#1081338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-2653", "url": "https://www.cve.org/CVERecord?id=CVE-2014-2653" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-2653", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-2653" } ], "release_date": "2014-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-10-13T21:21:23+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional:openssh-0:5.3p1-104.el6.i686", "6Client-optional:openssh-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-0:5.3p1-104.el6.src", "6Client-optional:openssh-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-104.el6.i686", "6Client-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Client:openssh-0:5.3p1-104.el6.i686", "6Client:openssh-0:5.3p1-104.el6.ppc64", "6Client:openssh-0:5.3p1-104.el6.s390x", "6Client:openssh-0:5.3p1-104.el6.src", "6Client:openssh-0:5.3p1-104.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-104.el6.i686", "6Client:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-104.el6.s390x", "6Client:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Client:openssh-clients-0:5.3p1-104.el6.i686", "6Client:openssh-clients-0:5.3p1-104.el6.ppc64", "6Client:openssh-clients-0:5.3p1-104.el6.s390x", "6Client:openssh-clients-0:5.3p1-104.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-104.el6.i686", "6Client:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-104.el6.s390x", "6Client:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Client:openssh-server-0:5.3p1-104.el6.i686", "6Client:openssh-server-0:5.3p1-104.el6.ppc64", "6Client:openssh-server-0:5.3p1-104.el6.s390x", "6Client:openssh-server-0:5.3p1-104.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-0:5.3p1-104.el6.src", "6ComputeNode:openssh-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-104.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Server-optional:openssh-0:5.3p1-104.el6.i686", "6Server-optional:openssh-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-0:5.3p1-104.el6.src", "6Server-optional:openssh-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-104.el6.i686", "6Server-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Server:openssh-0:5.3p1-104.el6.i686", "6Server:openssh-0:5.3p1-104.el6.ppc64", "6Server:openssh-0:5.3p1-104.el6.s390x", "6Server:openssh-0:5.3p1-104.el6.src", "6Server:openssh-0:5.3p1-104.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-104.el6.i686", "6Server:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-104.el6.s390x", "6Server:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Server:openssh-clients-0:5.3p1-104.el6.i686", "6Server:openssh-clients-0:5.3p1-104.el6.ppc64", "6Server:openssh-clients-0:5.3p1-104.el6.s390x", "6Server:openssh-clients-0:5.3p1-104.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-104.el6.i686", "6Server:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-104.el6.s390x", "6Server:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Server:openssh-server-0:5.3p1-104.el6.i686", "6Server:openssh-server-0:5.3p1-104.el6.ppc64", "6Server:openssh-server-0:5.3p1-104.el6.s390x", "6Server:openssh-server-0:5.3p1-104.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-104.el6.src", "6Workstation-optional:openssh-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Workstation:openssh-0:5.3p1-104.el6.i686", "6Workstation:openssh-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-0:5.3p1-104.el6.s390x", "6Workstation:openssh-0:5.3p1-104.el6.src", "6Workstation:openssh-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-104.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-104.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-104.el6.i686", "6Workstation:openssh-clients-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-104.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-104.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-104.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-104.el6.i686", "6Workstation:openssh-server-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-104.el6.s390x", "6Workstation:openssh-server-0:5.3p1-104.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-optional:openssh-0:5.3p1-104.el6.i686", "6Client-optional:openssh-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-0:5.3p1-104.el6.src", "6Client-optional:openssh-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Client-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Client-optional:openssh-server-0:5.3p1-104.el6.i686", "6Client-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Client-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Client-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Client-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Client:openssh-0:5.3p1-104.el6.i686", "6Client:openssh-0:5.3p1-104.el6.ppc64", "6Client:openssh-0:5.3p1-104.el6.s390x", "6Client:openssh-0:5.3p1-104.el6.src", "6Client:openssh-0:5.3p1-104.el6.x86_64", "6Client:openssh-askpass-0:5.3p1-104.el6.i686", "6Client:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Client:openssh-askpass-0:5.3p1-104.el6.s390x", "6Client:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Client:openssh-clients-0:5.3p1-104.el6.i686", "6Client:openssh-clients-0:5.3p1-104.el6.ppc64", "6Client:openssh-clients-0:5.3p1-104.el6.s390x", "6Client:openssh-clients-0:5.3p1-104.el6.x86_64", "6Client:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Client:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Client:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Client:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Client:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Client:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Client:openssh-ldap-0:5.3p1-104.el6.i686", "6Client:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Client:openssh-ldap-0:5.3p1-104.el6.s390x", "6Client:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Client:openssh-server-0:5.3p1-104.el6.i686", "6Client:openssh-server-0:5.3p1-104.el6.ppc64", "6Client:openssh-server-0:5.3p1-104.el6.s390x", "6Client:openssh-server-0:5.3p1-104.el6.x86_64", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Client:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.src", "6ComputeNode-optional:openssh-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.i686", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.s390x", "6ComputeNode-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6ComputeNode-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6ComputeNode:openssh-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-0:5.3p1-104.el6.src", "6ComputeNode:openssh-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-askpass-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-clients-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.s390", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-ldap-0:5.3p1-104.el6.x86_64", "6ComputeNode:openssh-server-0:5.3p1-104.el6.i686", "6ComputeNode:openssh-server-0:5.3p1-104.el6.ppc64", "6ComputeNode:openssh-server-0:5.3p1-104.el6.s390x", "6ComputeNode:openssh-server-0:5.3p1-104.el6.x86_64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6ComputeNode:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Server-optional:openssh-0:5.3p1-104.el6.i686", "6Server-optional:openssh-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-0:5.3p1-104.el6.src", "6Server-optional:openssh-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Server-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Server-optional:openssh-server-0:5.3p1-104.el6.i686", "6Server-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Server-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Server-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Server-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Server:openssh-0:5.3p1-104.el6.i686", "6Server:openssh-0:5.3p1-104.el6.ppc64", "6Server:openssh-0:5.3p1-104.el6.s390x", "6Server:openssh-0:5.3p1-104.el6.src", "6Server:openssh-0:5.3p1-104.el6.x86_64", "6Server:openssh-askpass-0:5.3p1-104.el6.i686", "6Server:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Server:openssh-askpass-0:5.3p1-104.el6.s390x", "6Server:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Server:openssh-clients-0:5.3p1-104.el6.i686", "6Server:openssh-clients-0:5.3p1-104.el6.ppc64", "6Server:openssh-clients-0:5.3p1-104.el6.s390x", "6Server:openssh-clients-0:5.3p1-104.el6.x86_64", "6Server:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Server:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Server:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Server:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Server:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Server:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Server:openssh-ldap-0:5.3p1-104.el6.i686", "6Server:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Server:openssh-ldap-0:5.3p1-104.el6.s390x", "6Server:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Server:openssh-server-0:5.3p1-104.el6.i686", "6Server:openssh-server-0:5.3p1-104.el6.ppc64", "6Server:openssh-server-0:5.3p1-104.el6.s390x", "6Server:openssh-server-0:5.3p1-104.el6.x86_64", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Server:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Workstation-optional:openssh-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-0:5.3p1-104.el6.src", "6Workstation-optional:openssh-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-clients-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.i686", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.ppc64", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.s390x", "6Workstation-optional:openssh-server-0:5.3p1-104.el6.x86_64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Workstation-optional:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64", "6Workstation:openssh-0:5.3p1-104.el6.i686", "6Workstation:openssh-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-0:5.3p1-104.el6.s390x", "6Workstation:openssh-0:5.3p1-104.el6.src", "6Workstation:openssh-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-askpass-0:5.3p1-104.el6.i686", "6Workstation:openssh-askpass-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-askpass-0:5.3p1-104.el6.s390x", "6Workstation:openssh-askpass-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-clients-0:5.3p1-104.el6.i686", "6Workstation:openssh-clients-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-clients-0:5.3p1-104.el6.s390x", "6Workstation:openssh-clients-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.i686", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.ppc", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.s390", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.s390x", "6Workstation:openssh-debuginfo-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-ldap-0:5.3p1-104.el6.i686", "6Workstation:openssh-ldap-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-ldap-0:5.3p1-104.el6.s390x", "6Workstation:openssh-ldap-0:5.3p1-104.el6.x86_64", "6Workstation:openssh-server-0:5.3p1-104.el6.i686", "6Workstation:openssh-server-0:5.3p1-104.el6.ppc64", "6Workstation:openssh-server-0:5.3p1-104.el6.s390x", "6Workstation:openssh-server-0:5.3p1-104.el6.x86_64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.i686", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.ppc64", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.s390", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.s390x", "6Workstation:pam_ssh_agent_auth-0:0.9.3-104.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssh: failure to check DNS SSHFP records in certain scenarios" } ] }
ghsa-qf84-3fjj-8852
Vulnerability from github
sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
{ "affected": [], "aliases": [ "CVE-2014-2532" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-03-18T05:18:00Z", "severity": "MODERATE" }, "details": "sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.", "id": "GHSA-qf84-3fjj-8852", "modified": "2022-05-14T03:13:02Z", "published": "2022-05-14T03:13:02Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-2532" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91986" }, { "type": "WEB", "url": "https://support.apple.com/HT205267" }, { "type": "WEB", "url": "http://advisories.mageia.org/MGASA-2014-0143.html" }, { "type": "WEB", "url": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=141576985122836\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=openbsd-security-announce\u0026m=139492048027313\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1552.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/57488" }, { "type": "WEB", "url": "http://secunia.com/advisories/57574" }, { "type": "WEB", "url": "http://secunia.com/advisories/59313" }, { "type": "WEB", "url": "http://secunia.com/advisories/59855" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-2894" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:068" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:095" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/66355" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1029925" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2155-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ] }
var-201403-0275
Vulnerability from variot
sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character. OpenSSH is prone to a security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Versions prior to OpenSSH 6.6 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: openssh security, bug fix, and enhancement update Advisory ID: RHSA-2014:1552-02 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1552.html Issue date: 2014-10-14 CVE Names: CVE-2014-2532 CVE-2014-2653 =====================================================================
- Summary:
Updated openssh packages that fix two security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
OpenSSH is OpenBSD's SSH (Secure Shell) protocol implementation. These packages include the core files necessary for both the OpenSSH client and server.
It was discovered that OpenSSH clients did not correctly verify DNS SSHFP records. A malicious server could use this flaw to force a connecting client to skip the DNS SSHFP record check and require the user to perform manual host verification of the DNS SSHFP record. (CVE-2014-2653)
It was found that OpenSSH did not properly handle certain AcceptEnv parameter values with wildcard characters. (CVE-2014-2532)
This update also fixes the following bugs:
-
Based on the SP800-131A information security standard, the generation of a digital signature using the Digital Signature Algorithm (DSA) with the key size of 1024 bits and RSA with the key size of less than 2048 bits is disallowed after the year 2013. After this update, ssh-keygen no longer generates keys with less than 2048 bits in FIPS mode. However, the sshd service accepts keys of size 1024 bits as well as larger keys for compatibility reasons. (BZ#993580)
-
Previously, the openssh utility incorrectly set the oom_adj value to -17 for all of its children processes. This behavior was incorrect because the children processes were supposed to have this value set to 0. This update applies a patch to fix this bug and oom_adj is now properly set to 0 for all children processes as expected. (BZ#1010429)
-
Previously, if the sshd service failed to verify the checksum of an installed FIPS module using the fipscheck library, the information about this failure was only provided at the standard error output of sshd. As a consequence, the user could not notice this message and be uninformed when a system had not been properly configured for FIPS mode. To fix this bug, this behavior has been changed and sshd now sends such messages via the syslog service. (BZ#1020803)
-
When keys provided by the pkcs11 library were removed from the ssh agent using the "ssh-add -e" command, the user was prompted to enter a PIN. With this update, a patch has been applied to allow the user to remove the keys provided by pkcs11 without the PIN. (BZ#1042519)
In addition, this update adds the following enhancements:
-
With this update, ControlPersist has been added to OpenSSH. The option in conjunction with the ControlMaster configuration directive specifies that the master connection remains open in the background after the initial client connection has been closed. (BZ#953088)
-
When the sshd daemon is configured to force the internal SFTP session, and the user attempts to use a connection other than SFTP, the appropriate message is logged to the /var/log/secure file. (BZ#997377)
-
Support for Elliptic Curve Cryptography modes for key exchange (ECDH) and host user keys (ECDSA) as specified by RFC5656 has been added to the openssh packages. However, they are not enabled by default and the user has to enable them manually. For more information on how to configure ECDSA and ECDH with OpenSSH, see: https://access.redhat.com/solutions/711953 (BZ#1028335)
All openssh users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
953088 - OpenSSH adding ControlPersist patch to enable full usage of SSH control options 1010429 - Openssh Incorrectly sets oom_adj in all Children after Performing a Reload 1023043 - ssh_config manual page lists incorrect default value of KexAlgorithms 1023044 - Fix man page for ssh-keygen because of certificate support 1027197 - X11 Forwarding does not work with default config - error: Failed to allocate internet-domain X11 display socket 1028643 - Connection remains when fork() fails. 1077843 - CVE-2014-2532 openssh: AcceptEnv environment restriction bypass flaw 1081338 - CVE-2014-2653 openssh: failure to check DNS SSHFP records in certain scenarios 1108836 - ssh-keyscan should ignore SIGPIPE 1111568 - AUTOCREATE_SERVER_KEYS=RSAONLY is not supported by init script
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: openssh-5.3p1-104.el6.src.rpm
i386: openssh-5.3p1-104.el6.i686.rpm openssh-askpass-5.3p1-104.el6.i686.rpm openssh-clients-5.3p1-104.el6.i686.rpm openssh-debuginfo-5.3p1-104.el6.i686.rpm openssh-server-5.3p1-104.el6.i686.rpm
x86_64: openssh-5.3p1-104.el6.x86_64.rpm openssh-askpass-5.3p1-104.el6.x86_64.rpm openssh-clients-5.3p1-104.el6.x86_64.rpm openssh-debuginfo-5.3p1-104.el6.x86_64.rpm openssh-server-5.3p1-104.el6.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: openssh-debuginfo-5.3p1-104.el6.i686.rpm openssh-ldap-5.3p1-104.el6.i686.rpm pam_ssh_agent_auth-0.9.3-104.el6.i686.rpm
x86_64: openssh-debuginfo-5.3p1-104.el6.i686.rpm openssh-debuginfo-5.3p1-104.el6.x86_64.rpm openssh-ldap-5.3p1-104.el6.x86_64.rpm pam_ssh_agent_auth-0.9.3-104.el6.i686.rpm pam_ssh_agent_auth-0.9.3-104.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: openssh-5.3p1-104.el6.src.rpm
x86_64: openssh-5.3p1-104.el6.x86_64.rpm openssh-clients-5.3p1-104.el6.x86_64.rpm openssh-debuginfo-5.3p1-104.el6.x86_64.rpm openssh-server-5.3p1-104.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64: openssh-askpass-5.3p1-104.el6.x86_64.rpm openssh-debuginfo-5.3p1-104.el6.i686.rpm openssh-debuginfo-5.3p1-104.el6.x86_64.rpm openssh-ldap-5.3p1-104.el6.x86_64.rpm pam_ssh_agent_auth-0.9.3-104.el6.i686.rpm pam_ssh_agent_auth-0.9.3-104.el6.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: openssh-5.3p1-104.el6.src.rpm
i386: openssh-5.3p1-104.el6.i686.rpm openssh-askpass-5.3p1-104.el6.i686.rpm openssh-clients-5.3p1-104.el6.i686.rpm openssh-debuginfo-5.3p1-104.el6.i686.rpm openssh-server-5.3p1-104.el6.i686.rpm
ppc64: openssh-5.3p1-104.el6.ppc64.rpm openssh-askpass-5.3p1-104.el6.ppc64.rpm openssh-clients-5.3p1-104.el6.ppc64.rpm openssh-debuginfo-5.3p1-104.el6.ppc64.rpm openssh-server-5.3p1-104.el6.ppc64.rpm
s390x: openssh-5.3p1-104.el6.s390x.rpm openssh-askpass-5.3p1-104.el6.s390x.rpm openssh-clients-5.3p1-104.el6.s390x.rpm openssh-debuginfo-5.3p1-104.el6.s390x.rpm openssh-server-5.3p1-104.el6.s390x.rpm
x86_64: openssh-5.3p1-104.el6.x86_64.rpm openssh-askpass-5.3p1-104.el6.x86_64.rpm openssh-clients-5.3p1-104.el6.x86_64.rpm openssh-debuginfo-5.3p1-104.el6.x86_64.rpm openssh-server-5.3p1-104.el6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386: openssh-debuginfo-5.3p1-104.el6.i686.rpm openssh-ldap-5.3p1-104.el6.i686.rpm pam_ssh_agent_auth-0.9.3-104.el6.i686.rpm
ppc64: openssh-debuginfo-5.3p1-104.el6.ppc.rpm openssh-debuginfo-5.3p1-104.el6.ppc64.rpm openssh-ldap-5.3p1-104.el6.ppc64.rpm pam_ssh_agent_auth-0.9.3-104.el6.ppc.rpm pam_ssh_agent_auth-0.9.3-104.el6.ppc64.rpm
s390x: openssh-debuginfo-5.3p1-104.el6.s390.rpm openssh-debuginfo-5.3p1-104.el6.s390x.rpm openssh-ldap-5.3p1-104.el6.s390x.rpm pam_ssh_agent_auth-0.9.3-104.el6.s390.rpm pam_ssh_agent_auth-0.9.3-104.el6.s390x.rpm
x86_64: openssh-debuginfo-5.3p1-104.el6.i686.rpm openssh-debuginfo-5.3p1-104.el6.x86_64.rpm openssh-ldap-5.3p1-104.el6.x86_64.rpm pam_ssh_agent_auth-0.9.3-104.el6.i686.rpm pam_ssh_agent_auth-0.9.3-104.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: openssh-5.3p1-104.el6.src.rpm
i386: openssh-5.3p1-104.el6.i686.rpm openssh-askpass-5.3p1-104.el6.i686.rpm openssh-clients-5.3p1-104.el6.i686.rpm openssh-debuginfo-5.3p1-104.el6.i686.rpm openssh-server-5.3p1-104.el6.i686.rpm
x86_64: openssh-5.3p1-104.el6.x86_64.rpm openssh-askpass-5.3p1-104.el6.x86_64.rpm openssh-clients-5.3p1-104.el6.x86_64.rpm openssh-debuginfo-5.3p1-104.el6.x86_64.rpm openssh-server-5.3p1-104.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386: openssh-debuginfo-5.3p1-104.el6.i686.rpm openssh-ldap-5.3p1-104.el6.i686.rpm pam_ssh_agent_auth-0.9.3-104.el6.i686.rpm
x86_64: openssh-debuginfo-5.3p1-104.el6.i686.rpm openssh-debuginfo-5.3p1-104.el6.x86_64.rpm openssh-ldap-5.3p1-104.el6.x86_64.rpm pam_ssh_agent_auth-0.9.3-104.el6.i686.rpm pam_ssh_agent_auth-0.9.3-104.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2014-2532.html https://www.redhat.com/security/data/cve/CVE-2014-2653.html https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/solutions/711953
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFUPK1zXlSAg2UNWIIRAgLFAKCbc0zGun3IBr/70ChlueemUsEORgCfa8RL IT6RfneDJRTv3j8EqBZSrp0= =33Fn -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201405-06
http://security.gentoo.org/
Severity: High Title: OpenSSH: Multiple vulnerabilities Date: May 11, 2014 Bugs: #231292, #247466, #386307, #410869, #419357, #456006, #505066 ID: 201405-06
Synopsis
Multiple vulnerabilities have been found in OpenSSH, the worst of which may allow remote attackers to execute arbitrary code. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All OpenSSH users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/openssh-6.6_p1-r1"
NOTE: One or more of the issues described in this advisory have been fixed in previous updates. They are included in this advisory for the sake of completeness. It is likely that your system is already no longer affected by them.
References
[ 1 ] CVE-2008-5161 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5161 [ 2 ] CVE-2010-4478 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4478 [ 3 ] CVE-2010-4755 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4755 [ 4 ] CVE-2010-5107 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5107 [ 5 ] CVE-2011-5000 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-5000 [ 6 ] CVE-2012-0814 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0814 [ 7 ] CVE-2014-2532 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2532
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201405-06.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2015-09-30-3 OS X El Capitan 10.11
OS X El Capitan 10.11 is now available and addresses the following:
Address Book Available for: Mac OS X v10.6.8 and later Impact: A local attacker may be able to inject arbitrary code to processes loading the Address Book framework Description: An issue existed in Address Book framework's handling of an environment variable. This issue was addressed through improved environment variable handling. CVE-ID CVE-2015-5897 : Dan Bastone of Gotham Digital Science
AirScan Available for: Mac OS X v10.6.8 and later Impact: An attacker with a privileged network position may be able to extract payload from eSCL packets sent over a secure connection Description: An issue existed in the processing of eSCL packets. This issue was addressed through improved validation checks. CVE-ID CVE-2015-5853 : an anonymous researcher
apache_mod_php Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in PHP Description: Multiple vulnerabilities existed in PHP versions prior to 5.5.27, including one which may have led to remote code execution. This issue was addressed by updating PHP to version 5.5.27. CVE-ID CVE-2014-9425 CVE-2014-9427 CVE-2014-9652 CVE-2014-9705 CVE-2014-9709 CVE-2015-0231 CVE-2015-0232 CVE-2015-0235 CVE-2015-0273 CVE-2015-1351 CVE-2015-1352 CVE-2015-2301 CVE-2015-2305 CVE-2015-2331 CVE-2015-2348 CVE-2015-2783 CVE-2015-2787 CVE-2015-3329 CVE-2015-3330
Apple Online Store Kit Available for: Mac OS X v10.6.8 and later Impact: A malicious application may gain access to a user's keychain items Description: An issue existed in validation of access control lists for iCloud keychain items. This issue was addressed through improved access control list checks. CVE-ID CVE-2015-5836 : XiaoFeng Wang of Indiana University, Luyi Xing of Indiana University, Tongxin Li of Peking University, Tongxin Li of Peking University, Xiaolong Bai of Tsinghua University
AppleEvents Available for: Mac OS X v10.6.8 and later Impact: A user connected through screen sharing can send Apple Events to a local user's session Description: An issue existed with Apple Event filtering that allowed some users to send events to other users. This was addressed by improved Apple Event handling. CVE-ID CVE-2015-5849 : Jack Lawrence (@_jackhl)
Audio Available for: Mac OS X v10.6.8 and later Impact: Playing a malicious audio file may lead to an unexpected application termination Description: A memory corruption issue existed in the handling of audio files. This issue issue was addressed through improved memory handling. CVE-ID CVE-2015-5862 : YoungJin Yoon of Information Security Lab. (Adv.: Prof. Taekyoung Kwon), Yonsei University, Seoul, Korea
bash Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in bash Description: Multiple vulnerabilities existed in bash versions prior to 3.2 patch level 57. These issues were addressed by updating bash version 3.2 to patch level 57. CVE-ID CVE-2014-6277 CVE-2014-7186 CVE-2014-7187
Certificate Trust Policy Available for: Mac OS X v10.6.8 and later Impact: Update to the certificate trust policy Description: The certificate trust policy was updated. The complete list of certificates may be viewed at https://support.apple.com/en- us/HT202858.
CFNetwork Cookies Available for: Mac OS X v10.6.8 and later Impact: An attacker in a privileged network position can track a user's activity Description: A cross-domain cookie issue existed in the handling of top level domains. The issue was address through improved restrictions of cookie creation. CVE-ID CVE-2015-5885 : Xiaofeng Zheng of Blue Lotus Team, Tsinghua University
CFNetwork FTPProtocol Available for: Mac OS X v10.6.8 and later Impact: Malicious FTP servers may be able to cause the client to perform reconnaissance on other hosts Description: An issue existed in the handling of FTP packets when using the PASV command. This issue was resolved through improved validation. CVE-ID CVE-2015-5912 : Amit Klein
CFNetwork HTTPProtocol Available for: Mac OS X v10.6.8 and later Impact: A maliciously crafted URL may be able to bypass HSTS and leak sensitive data Description: A URL parsing vulnerability existed in HSTS handling. This issue was addressed through improved URL parsing. CVE-ID CVE-2015-5858 : Xiaofeng Zheng of Blue Lotus Team, Tsinghua University
CFNetwork HTTPProtocol Available for: Mac OS X v10.6.8 and later Impact: A malicious website may be able to track users in Safari private browsing mode Description: An issue existed in the handling of HSTS state in Safari private browsing mode. This issue was addressed through improved state handling. CVE-ID CVE-2015-5860 : Sam Greenhalgh of RadicalResearch Ltd
CFNetwork Proxies Available for: Mac OS X v10.6.8 and later Impact: Connecting to a malicious web proxy may set malicious cookies for a website Description: An issue existed in the handling of proxy connect responses. This issue was addressed by removing the set-cookie header while parsing the connect response. CVE-ID CVE-2015-5841 : Xiaofeng Zheng of Blue Lotus Team, Tsinghua University
CFNetwork SSL Available for: Mac OS X v10.6.8 and later Impact: An attacker with a privileged network position may intercept SSL/TLS connections Description: A certificate validation issue existed in NSURL when a certificate changed. This issue was addressed through improved certificate validation. CVE-ID CVE-2015-5824 : Timothy J. Wood of The Omni Group
CFNetwork SSL Available for: Mac OS X v10.6.8 and later Impact: An attacker may be able to decrypt data protected by SSL Description: There are known attacks on the confidentiality of RC4. An attacker could force the use of RC4, even if the server preferred better ciphers, by blocking TLS 1.0 and higher connections until CFNetwork tried SSL 3.0, which only allows RC4. This issue was addressed by removing the fallback to SSL 3.0.
CoreCrypto Available for: Mac OS X v10.6.8 and later Impact: An attacker may be able to determine a private key Description: By observing many signing or decryption attempts, an attacker may have been able to determine the RSA private key. This issue was addressed using improved encryption algorithms.
CoreText Available for: Mac OS X v10.6.8 and later Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-5874 : John Villamil (@day6reak), Yahoo Pentest Team
Dev Tools Available for: Mac OS X v10.6.8 and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in dyld. This was addressed through improved memory handling. CVE-ID CVE-2015-5876 : beist of grayhash
Dev Tools Available for: Mac OS X v10.6.8 and later Impact: An application may be able to bypass code signing Description: An issue existed with validation of the code signature of executables. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-5839 : @PanguTeam
Disk Images Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in DiskImages. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5847 : Filippo Bigarella, Luca Todesco
dyld Available for: Mac OS X v10.6.8 and later Impact: An application may be able to bypass code signing Description: An issue existed with validation of the code signature of executables. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-5839 : TaiG Jailbreak Team
EFI Available for: Mac OS X v10.6.8 and later Impact: A malicious application can prevent some systems from booting Description: An issue existed with the addresses covered by the protected range register. This issue was fixed by changing the protected range. CVE-ID CVE-2015-5900 : Xeno Kovah & Corey Kallenberg from LegbaCore
EFI Available for: Mac OS X v10.6.8 and later Impact: A malicious Apple Ethernet Thunderbolt adapter may be able to affect firmware flashing Description: Apple Ethernet Thunderbolt adapters could modify the host firmware if connected during an EFI update. This issue was addressed by not loading option ROMs during updates. CVE-ID CVE-2015-5914 : Trammell Hudson of Two Sigma Investments and snare
Finder Available for: Mac OS X v10.6.8 and later Impact: The "Secure Empty Trash" feature may not securely delete files placed in the Trash Description: An issue existed in guaranteeing secure deletion of Trash files on some systems, such as those with flash storage. This issue was addressed by removing the "Secure Empty Trash" option. CVE-ID CVE-2015-5901 : Apple
Game Center Available for: Mac OS X v10.6.8 and later Impact: A malicious Game Center application may be able to access a player's email address Description: An issue existed in Game Center in the handling of a player's email. This issue was addressed through improved access restrictions. CVE-ID CVE-2015-5855 : Nasser Alnasser
Heimdal Available for: Mac OS X v10.6.8 and later Impact: An attacker may be able to replay Kerberos credentials to the SMB server Description: An authentication issue existed in Kerberos credentials. This issue was addressed through additional validation of credentials using a list of recently seen credentials. CVE-ID CVE-2015-5913 : Tarun Chopra of Microsoft Corporation, U.S. and Yu Fan of Microsoft Corporation, China
ICU Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in ICU Description: Multiple vulnerabilities existed in ICU versions prior to 53.1.0. These issues were addressed by updating ICU to version 55.1. CVE-ID CVE-2014-8146 CVE-2014-8147 CVE-2015-5922
Install Framework Legacy Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to gain root privileges Description: A restriction issue existed in the Install private framework containing a privileged executable. This issue was addressed by removing the executable. CVE-ID CVE-2015-5888 : Apple
Intel Graphics Driver Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with system privileges Description: Multiple memory corruption issues existed in the Intel Graphics Driver. These issues were addressed through improved memory handling. CVE-ID CVE-2015-5830 : Yuki MIZUNO (@mzyy94) CVE-2015-5877 : Camillus Gerard Cai
IOAudioFamily Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to determine kernel memory layout Description: An issue existed in IOAudioFamily that led to the disclosure of kernel memory content. This issue was addressed by permuting kernel pointers. CVE-ID CVE-2015-5864 : Luca Todesco
IOGraphics Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues existed in the kernel. These issues were addressed through improved memory handling. CVE-ID CVE-2015-5871 : Ilja van Sprundel of IOActive CVE-2015-5872 : Ilja van Sprundel of IOActive CVE-2015-5873 : Ilja van Sprundel of IOActive CVE-2015-5890 : Ilja van Sprundel of IOActive
IOGraphics Available for: Mac OS X v10.6.8 and later Impact: A malicious application may be able to determine kernel memory layout Description: An issue existed in IOGraphics which could have led to the disclosure of kernel memory layout. This issue was addressed through improved memory management. CVE-ID CVE-2015-5865 : Luca Todesco
IOHIDFamily Available for: Mac OS X v10.6.8 and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple memory corruption issues existed in IOHIDFamily. These issues were addressed through improved memory handling. CVE-ID CVE-2015-5866 : Apple CVE-2015-5867 : moony li of Trend Micro
IOStorageFamily Available for: Mac OS X v10.6.8 and later Impact: A local attacker may be able to read kernel memory Description: A memory initialization issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5863 : Ilja van Sprundel of IOActive
Kernel Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues existed in the Kernel. These issues were addressed through improved memory handling. CVE-ID CVE-2015-5868 : Cererdlong of Alibaba Mobile Security Team CVE-2015-5896 : Maxime Villard of m00nbsd CVE-2015-5903 : CESG
Kernel Available for: Mac OS X v10.6.8 and later Impact: A local process can modify other processes without entitlement checks Description: An issue existed where root processes using the processor_set_tasks API were allowed to retrieve the task ports of other processes. This issue was addressed through additional entitlement checks. CVE-ID CVE-2015-5882 : Pedro Vilaca, working from original research by Ming-chieh Pan and Sung-ting Tsai; Jonathan Levin
Kernel Available for: Mac OS X v10.6.8 and later Impact: A local attacker may control the value of stack cookies Description: Multiple weaknesses existed in the generation of user space stack cookies. These issues were addressed through improved generation of stack cookies. CVE-ID CVE-2013-3951 : Stefan Esser
Kernel Available for: Mac OS X v10.6.8 and later Impact: An attacker may be able to launch denial of service attacks on targeted TCP connections without knowing the correct sequence number Description: An issue existed in xnu's validation of TCP packet headers. This issue was addressed through improved TCP packet header validation. CVE-ID CVE-2015-5879 : Jonathan Looney
Kernel Available for: Mac OS X v10.6.8 and later Impact: An attacker in a local LAN segment may disable IPv6 routing Description: An insufficient validation issue existed in the handling of IPv6 router advertisements that allowed an attacker to set the hop limit to an arbitrary value. This issue was addressed by enforcing a minimum hop limit. CVE-ID CVE-2015-5869 : Dennis Spindel Ljungmark
Kernel Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to determine kernel memory layout Description: An issue existed that led to the disclosure of kernel memory layout. This was addressed through improved initialization of kernel memory structures. CVE-ID CVE-2015-5842 : beist of grayhash
Kernel Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to determine kernel memory layout Description: An issue existed in debugging interfaces that led to the disclosure of memory content. This issue was addressed by sanitizing output from debugging interfaces. CVE-ID CVE-2015-5870 : Apple
Kernel Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to cause a system denial of service Description: A state management issue existed in debugging functionality. This issue was addressed through improved validation. CVE-ID CVE-2015-5902 : Sergi Alvarez (pancake) of NowSecure Research Team
libc Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2014-8611 : Adrian Chadd and Alfred Perlstein of Norse Corporation
libpthread Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5899 : Lufeng Li of Qihoo 360 Vulcan Team
libxpc Available for: Mac OS X v10.6.8 and later Impact: Many SSH connections could cause a denial of service Description: launchd had no limit on the number of processes that could be started by a network connection. This issue was addressed by limiting the number of SSH processes to 40. CVE-ID CVE-2015-5881 : Apple
Login Window Available for: Mac OS X v10.6.8 and later Impact: The screen lock may not engage after the specified time period Description: An issue existed with captured display locking. The issue was addressed through improved lock handling. CVE-ID CVE-2015-5833 : Carlos Moreira, Rainer Dorau of rainer dorau informationsdesign, Chris Nehren, Kai Takac, Hans Douma, Toni Vaahtera, and an anonymous researcher
lukemftpd Available for: Mac OS X v10.6.8 and later Impact: A remote attacker may be able to deny service to the FTP server Description: A glob-processing issue existed in tnftpd. This issue was addressed through improved glob validation. CVE-ID CVE-2015-5917 : Maksymilian Arciemowicz of cxsecurity.com
Mail Available for: Mac OS X v10.6.8 and later Impact: Printing an email may leak sensitive user information Description: An issue existed in Mail which bypassed user preferences when printing an email. This issue was addressed through improved user preference enforcement. CVE-ID CVE-2015-5881 : Owen DeLong of Akamai Technologies, Noritaka Kamiya, Dennis Klein from Eschenburg, Germany, Jeff Hammett of Systim Technology Partners
Mail Available for: Mac OS X v10.6.8 and later Impact: An attacker in a privileged network position may be able to intercept attachments of S/MIME-encrypted e-mail sent via Mail Drop Description: An issue existed in handling encryption parameters for large email attachments sent via Mail Drop. The issue is addressed by no longer offering Mail Drop when sending an encrypted e-mail. CVE-ID CVE-2015-5884 : John McCombs of Integrated Mapping Ltd
Multipeer Connectivity Available for: Mac OS X v10.6.8 and later Impact: A local attacker may be able to observe unprotected multipeer data Description: An issue existed in convenience initializer handling in which encryption could be actively downgraded to a non-encrypted session. This issue was addressed by changing the convenience initializer to require encryption. CVE-ID CVE-2015-5851 : Alban Diquet (@nabla_c0d3) of Data Theorem
NetworkExtension Available for: Mac OS X v10.6.8 and later Impact: A malicious application may be able to determine kernel memory layout Description: An uninitialized memory issue in the kernel led to the disclosure of kernel memory content. This issue was addressed through improved memory initialization. CVE-ID CVE-2015-5831 : Maxime Villard of m00nbsd
Notes Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to leak sensitive user information Description: An issue existed in parsing links in the Notes application. This issue was addressed through improved input validation. CVE-ID CVE-2015-5878 : Craig Young of Tripwire VERT, an anonymous researcher
Notes Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to leak sensitive user information Description: A cross-site scripting issue existed in parsing text by the Notes application. This issue was addressed through improved input validation. CVE-ID CVE-2015-5875 : xisigr of Tencent's Xuanwu LAB (www.tencent.com)
OpenSSH Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in OpenSSH Description: Multiple vulnerabilities existed in OpenSSH versions prior to 6.9. These issues were addressed by updating OpenSSH to version 6.9. CVE-ID CVE-2014-2532
OpenSSL Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in OpenSSL Description: Multiple vulnerabilities existed in OpenSSL versions prior to 0.9.8zg. These were addressed by updating OpenSSL to version 0.9.8zg. CVE-ID CVE-2015-0286 CVE-2015-0287
procmail Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in procmail Description: Multiple vulnerabilities existed in procmail versions prior to 3.22. These issues were addressed by removing procmail. CVE-ID CVE-2014-3618
remote_cmds Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with root privileges Description: An issue existed in the usage of environment variables by the rsh binary. This issue was addressed by dropping setuid privileges from the rsh binary. CVE-ID CVE-2015-5889 : Philip Pettersson
removefile Available for: Mac OS X v10.6.8 and later Impact: Processing malicious data may lead to unexpected application termination Description: An overflow fault existed in the checkint division routines. This issue was addressed with improved division routines. CVE-ID CVE-2015-5840 : an anonymous researcher
Ruby Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in Ruby Description: Multiple vulnerabilities existed in Ruby versions prior to 2.0.0p645. These were addressed by updating Ruby to version 2.0.0p645. CVE-ID CVE-2014-8080 CVE-2014-8090 CVE-2015-1855
Security Available for: Mac OS X v10.6.8 and later Impact: The lock state of the keychain may be incorrectly displayed to the user Description: A state management issue existed in the way keychain lock status was tracked. This issue was addressed through improved state management. CVE-ID CVE-2015-5915 : Peter Walz of University of Minnesota, David Ephron, Eric E. Lawrence, Apple
Security Available for: Mac OS X v10.6.8 and later Impact: A trust evaluation configured to require revocation checking may succeed even if revocation checking fails Description: The kSecRevocationRequirePositiveResponse flag was specified but not implemented. This issue was addressed by implementing the flag. CVE-ID CVE-2015-5894 : Hannes Oud of kWallet GmbH
Security Available for: Mac OS X v10.6.8 and later Impact: A remote server may prompt for a certificate before identifying itself Description: Secure Transport accepted the CertificateRequest message before the ServerKeyExchange message. This issue was addressed by requiring the ServerKeyExchange first. CVE-ID CVE-2015-5887 : Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Alfredo Pironti, and Jean Karim Zinzindohoue of INRIA Paris-Rocquencourt, and Cedric Fournet and Markulf Kohlweiss of Microsoft Research, Pierre-Yves Strub of IMDEA Software Institute
SMB Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5891 : Ilja van Sprundel of IOActive
SMB Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to determine kernel memory layout Description: An issue existed in SMBClient that led to the disclosure of kernel memory content. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-5893 : Ilja van Sprundel of IOActive
SQLite Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in SQLite v3.8.5 Description: Multiple vulnerabilities existed in SQLite v3.8.5. These issues were addressed by updating SQLite to version 3.8.10.2. CVE-ID CVE-2015-3414 CVE-2015-3415 CVE-2015-3416
Telephony Available for: Mac OS X v10.6.8 and later Impact: A local attacker can place phone calls without the user's knowledge when using Continuity Description: An issue existed in the authorization checks for placing phone calls. This issue was addressed through improved authorization checks. CVE-ID CVE-2015-3785 : Dan Bastone of Gotham Digital Science
Terminal Available for: Mac OS X v10.6.8 and later Impact: Maliciously crafted text could mislead the user in Terminal Description: Terminal did not handle bidirectional override characters in the same way when displaying text and when selecting text. This issue was addressed by suppressing bidirectional override characters in Terminal. CVE-ID CVE-2015-5883 : an anonymous researcher
tidy Available for: Mac OS X v10.6.8 and later Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: Multiple memory corruption issues existed in tidy. These issues were addressed through improved memory handling. CVE-ID CVE-2015-5522 : Fernando Munoz of NULLGroup.com CVE-2015-5523 : Fernando Munoz of NULLGroup.com
Time Machine Available for: Mac OS X v10.6.8 and later Impact: A local attacker may gain access to keychain items Description: An issue existed in backups by the Time Machine framework. This issue was addressed through improved coverage of Time Machine backups. CVE-ID CVE-2015-5854 : Jonas Magazinius of Assured AB
Note: OS X El Capitan 10.11 includes the security content of Safari 9: https://support.apple.com/kb/HT205265.
OS X El Capitan 10.11 may be obtained from the Mac App Store: http://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org
iQIcBAEBCAAGBQJWDB2wAAoJEBcWfLTuOo7t0sYP/2L3JOGPkHH8XUh2YHpu5qaw S5F2v+SRpWleKQBVsGZ7oA8PV0rBTzEkzt8K1tNxYmxEqL9f/TpRiGoforn89thO /hOtmVOfUcBjPZ4XKwMVzycfSMC9o6LxWTLEKDVylE+F+5jkXafOC9QaqD11dxX6 QhENkpS1BwrKhyaSVxEcgBQtZM9aTsVdZ78rTCb9XTn6gDnvs8NfIQquFOnaQT54 YJ36e5UcUsnyBIol+yGDbC3ZEhzSVIGE5/8/NFlFfRXLgnJArxD8lqz8WdfU9fop hpT/dDqqAdYbRcW1ihcG1haiNHgP9yQCY5jRNfttb+Tc/kIi/QmPkEO0QS8Ygt/O c3sUbNulr1LCinymFVwx16CM1DplGS/GmBL18BAEBnL6yi9tEhYDynZWLSEa37VR 8q802rXRSF10Wct9/kEeR4HgY/1k0KK/4Uddm3c0YyOU21ya7NAhoHGwmDa9g11r N1TniOK8tPiCGjRNOJwuF6DKxD9L3Fv44bVlxAarGUGYkICqzaNS+bgKI1aQNahT fJ91x5uKD4+L9v9c5slkoDIvWqIhO9oyuxgnmC5GstkwFplFXSOklLkTktjLGNn1 nJq8cPnZ/3E1RXTEwVhGljYw5pdZHNx98XmLomGrPqVlZfjGURK+5AXdf2pOlt2e g6jld/w5tPuCFhGucE7Z =XciV -----END PGP SIGNATURE----- .
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653 http://advisories.mageia.org/MGASA-2014-0143.html http://advisories.mageia.org/MGASA-2014-0166.html
Updated Packages:
Mandriva Business Server 1/X86_64: 753bd40deb60429adc6a7c1afd63ee3d mbs1/x86_64/openssh-5.9p1-6.3.mbs1.x86_64.rpm 377e7fbb14f72a1e32da41f19be7baa8 mbs1/x86_64/openssh-askpass-5.9p1-6.3.mbs1.x86_64.rpm a906db623fc8d56eab9b8b99b1af84d9 mbs1/x86_64/openssh-askpass-common-5.9p1-6.3.mbs1.x86_64.rpm 9fc03d4929efdf21a26aef308eb66f14 mbs1/x86_64/openssh-askpass-gnome-5.9p1-6.3.mbs1.x86_64.rpm f2dbea4a0a8109bc835c69e871f07a69 mbs1/x86_64/openssh-clients-5.9p1-6.3.mbs1.x86_64.rpm a20d329b8332ff7f7f10dd541a3865a9 mbs1/x86_64/openssh-server-5.9p1-6.3.mbs1.x86_64.rpm 0fd2c0a9338a7e8e8747c2ea3ae43c49 mbs1/SRPMS/openssh-5.9p1-6.3.mbs1.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2014-2532
Jann Horn discovered that OpenSSH incorrectly handled wildcards in
AcceptEnv lines.
CVE-2014-2653
Matthew Vernon reported that if a SSH server offers a
HostCertificate that the ssh client doesn't accept, then the client
doesn't check the DNS for SSHFP records. As a consequence a
malicious server can disable SSHFP-checking by presenting a
certificate.
Note that a host verification prompt is still displayed before
connecting.
For the oldstable distribution (squeeze), these problems have been fixed in version 1:5.5p1-6+squeeze5.
For the stable distribution (wheezy), these problems have been fixed in version 1:6.0p1-4+deb7u1.
For the unstable distribution (sid), these problems have been fixed in version 1:6.6p1-1.
We recommend that you upgrade your openssh packages. ============================================================================ Ubuntu Security Notice USN-2155-1 March 25, 2014
openssh vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.10
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
OpenSSH incorrectly handled environment restrictions with wildcards.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 13.10: openssh-server 1:6.2p2-6ubuntu0.2
Ubuntu 12.10: openssh-server 1:6.0p1-3ubuntu1.1
Ubuntu 12.04 LTS: openssh-server 1:5.9p1-5ubuntu1.2
Ubuntu 10.04 LTS: openssh-server 1:5.3p1-3ubuntu7.1
In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04499681
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04499681 Version: 1
HPSBUX03188 SSRT101487 rev.1 - HP-UX running HP Secure Shell, Remote Denial of Service (DoS) and other Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2014-11-07 Last Updated: 2014-11-07
Potential Security Impact: Remote Denial of Service (DoS) and other vulnerabilities
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX running HP Secure Shell. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS) and other vulnerabilities.
References:
CVE-2013-4548 - remote Permissions, Privileges, and Access Control (CWE-264)
CVE-2014-1692 - remote Denial of Service (DoS), Buffer Errors (CWE-119)
CVE-2014-2532 - remote Permissions, Privileges, and Access Control (CWE-264)
CVE-2014-2653 - remote Input Validation (CWE-20)
SSRT101487
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11 running HP Secure Shell before version A.06.20.010
HP-UX B.11.23 running HP Secure Shell before version A.06.20.011
HP-UX B.11.31 running HP Secure Shell before version A.06.20.012
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2013-4548 (AV:N/AC:M/Au:S/C:P/I:P/A:P) 6.0 CVE-2014-1692 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2014-2532 (AV:N/AC:M/Au:N/C:P/I:P/A:N) 5.8 CVE-2014-2653 (AV:N/AC:M/Au:N/C:P/I:P/A:N) 5.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following software updates to resolve this vulnerability. The updates are available for download from: http://h20293.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber= T1471AA
OS Release HP Secure Shell Version Depot Name
HP-UX B.11.11 (11i v1) A.06.20.010 or subsequent HP_UX_11i_v1_T1471AA_A.06.20.010_HP-UX_B.11.11_32_64.depot
HP-UX B.11.23 (11i v2) A.06.20.011 or subsequent HP_UX_11i_v2_T1471AA_A.06.20.011_HP-UX_B.11.23_IA_PA.depot
HP-UX B.11.31 (11i v3) A.06.20.012 or subsequent HP_UX_11i_v3_SecureShell_A.06.20.012_HP-UX_B.11.31_IA_PA.depot
MANUAL ACTIONS: Yes - Update
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all HP-issued Security Bulletins and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa
AFFECTED VERSIONS
HP-UX B.11.11
Secure_Shell.SECURE_SHELL action: install revision A.06.20.010 or subsequent
HP-UX B.11.23
Secure_Shell.SECSH-CMN Secure_Shell.SECURE_SHELL action: install revision A.06.20.011 or subsequent
HP-UX B.11.31
Secure_Shell.SECSH-CMN Secure_Shell.SECURE_SHELL action: install revision A.06.20.012 or subsequent
END AFFECTED VERSIONS
HISTORY: Version:1 (rev.1) - 7 November 2014 Initial Release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201403-0275", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "communications user data repository", "scope": "eq", "trust": 1.9, "vendor": "oracle", "version": "10.0.1" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "6.3" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "6.2" }, { "model": "openssh", "scope": "lte", "trust": 1.0, "vendor": "openbsd", "version": "6.5" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "6.0" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "6.1" }, { "model": "openssh", "scope": "eq", "trust": 1.0, "vendor": "openbsd", "version": "6.4" }, { "model": "virtual i/o server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "big-ip wom hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "openssh", "scope": "ne", "trust": 0.3, "vendor": "openssh", "version": "6.6" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip gtm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "big-ip apm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "5.0p1", "scope": null, "trust": 0.3, "vendor": "openssh", "version": null }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "big-ip webaccelerator hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip gtm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "virtual i/o server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.8" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-iq device", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.10" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "6.4" }, { "model": "big-ip asm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.7" }, { "model": "big-ip edge gateway hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "communications policy management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.9.1" }, { "model": "big-ip apm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "idatplex dx360 m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79120" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "flex system compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x2407863" }, { "model": "big-ip psm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "idatplex dx360 m4 water cooled type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79180" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "system m4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x35007383" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1" }, { "model": "5.2p1", "scope": null, "trust": 0.3, "vendor": "openssh", "version": null }, { "model": "flex system compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x2207906" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip apm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip webaccelerator hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "idatplex dx360 m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79130" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.0" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.1" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.40" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.4" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip ltm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip analytics hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.2" }, { "model": "system m4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x33007382" }, { "model": "big-ip link controller hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.3" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.11" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3850x638370" }, { "model": "big-ip ltm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.2" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "flex system manager node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7955" }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.0" }, { "model": "nextscale nx360 m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "54550" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.4" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip ltm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-ip analytics hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "flex system compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x2408738" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip gtm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.3" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "6.2p1", "scope": null, "trust": 0.3, "vendor": "openssh", "version": null }, { "model": "big-ip link controller hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-iq device", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "big-ip edge gateway hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.0" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x365079150" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "big-ip wom hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip ltm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip aam", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "system m4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x35507914" }, { "model": "big-ip asm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0.0" }, { "model": "big-ip psm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip gtm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip apm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip psm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.8" }, { "model": "big-ip wom hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "gpfs for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5.0.11" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x357087330" }, { "model": "big-ip asm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "communications policy management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "9.7.3" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "6.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip link controller hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.2" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-ip edge gateway hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.1" }, { "model": "flex system compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x2202585" }, { "model": "big-ip webaccelerator hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "6.3" }, { "model": "6.2p2", "scope": null, "trust": 0.3, "vendor": "openssh", "version": null }, { "model": "big-ip afm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip wom hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "big-ip link controller hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "big-ip edge gateway hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "virtual i/o server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "6.2" }, { "model": "big-ip psm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "flex system compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x2227916" }, { "model": "big-ip webaccelerator hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "big-ip wom hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip analytics 11.0.0-hf2", "scope": null, "trust": 0.3, "vendor": "f5", "version": null }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "virtual i/o server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.14" }, { "model": "big-ip afm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.2" }, { "model": "big-ip asm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "big-ip analytics hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip edge gateway hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "flex system compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x8804259" }, { "model": "big-ip apm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "6.5" }, { "model": "system m4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x37508752" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip psm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip ltm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "business server", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "1x8664" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "big-ip apm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "system m4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x36307158" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.4" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-ip asm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.1.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "5.6p1", "scope": null, "trust": 0.3, "vendor": "openssh", "version": null }, { "model": "bladecenter advanced management module 3.66g", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip link controller hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip ltm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip apm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.0" }, { "model": "flex system compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x2408737" }, { "model": "big-ip gtm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "big-ip link controller hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.3" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "big-ip wom hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.4" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.00" }, { "model": "big-ip analytics hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip gtm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.1" }, { "model": "big-ip webaccelerator hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "system m4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x32502583" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip gtm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip link controller hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.3" }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "big-ip asm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.4" }, { "model": "system m4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x31002582" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "gpfs for windows", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.5" }, { "model": "big-ip psm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "6.1" }, { "model": "virtual i/o server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.1" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "virtual i/o server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.4" }, { "model": "p2", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.8" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.5" }, { "model": "big-ip apm hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "13.10" }, { "model": "big-ip analytics hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "big-ip psm hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-ip asm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.2" }, { "model": "nsm3000 appliances", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2012.2" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "big-ip edge gateway", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "nsmxpress appliances", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2012.2" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "system m5 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x310054570" }, { "model": "big-ip webaccelerator hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "system m4", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x35307160" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.3" }, { "model": "big-ip apm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "arx", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "6.1" }, { "model": "big-ip analytics hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.5" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.2" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0.00" }, { "model": "big-ip asm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip ltm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x357087180" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.0" }, { "model": "big-ip analytics hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "virtual i/o server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.3" }, { "model": "idatplex dx360 m4 water cooled type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "79190" }, { "model": "big-ip wom", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "2.3" }, { "model": "system type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x3950x638370" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "big-ip psm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip gtm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-iq cloud", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.3" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-ip ltm hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip apm hf2", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.0" }, { "model": "big-ip wom hf1", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "flex system compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x2408956" }, { "model": "flex system manager node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8731" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "flex system compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x8807903" }, { "model": "communications policy management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "12.1.1" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.2" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.5" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.5" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip analytics hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "system m4 hd", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x36305466" }, { "model": "big-ip apm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "big-ip pem", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5" }, { "model": "big-ip gtm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "flex system compute node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x4407917" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "system m4 hd", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x36505460" }, { "model": "system m4 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x357087220" }, { "model": "big-iq security", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.5" }, { "model": "flex system manager node", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8734" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.4" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0.00" }, { "model": "big-ip link controller", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-ip link controller hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" }, { "model": "big-ip gtm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip psm hf5", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "communications policy management", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "10.4.1" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.1.1" }, { "model": "big-ip webaccelerator hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "big-ip analytics", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.4.1" }, { "model": "virtual i/o server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2" }, { "model": "enterprise manager", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "3.1" }, { "model": "big-ip pem hf4", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "big-ip edge gateway hf7", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1.0" }, { "model": "big-ip ltm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.0" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "10.2.1" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "5.6" }, { "model": "big-ip webaccelerator", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.3" }, { "model": "system m5 type", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x325054580" }, { "model": "big-ip edge gateway hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip psm hf3", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.2.1" }, { "model": "big-ip psm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.1" }, { "model": "big-ip asm", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "11.5.1" } ], "sources": [ { "db": "BID", "id": "66355" }, { "db": "CNNVD", "id": "CNNVD-201403-336" }, { "db": "NVD", "id": "CVE-2014-2532" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:communications_user_data_repository:10.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-2532" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Jann Horn", "sources": [ { "db": "BID", "id": "66355" } ], "trust": 0.3 }, "cve": "CVE-2014-2532", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2014-2532", "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2014-2532", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201403-336", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2014-2532", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-2532" }, { "db": "CNNVD", "id": "CNNVD-201403-336" }, { "db": "NVD", "id": "CVE-2014-2532" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character. OpenSSH is prone to a security-bypass vulnerability. \nAn attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. \nVersions prior to OpenSSH 6.6 are vulnerable. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: openssh security, bug fix, and enhancement update\nAdvisory ID: RHSA-2014:1552-02\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2014-1552.html\nIssue date: 2014-10-14\nCVE Names: CVE-2014-2532 CVE-2014-2653 \n=====================================================================\n\n1. Summary:\n\nUpdated openssh packages that fix two security issues, several bugs, and\nadd various enhancements are now available for Red Hat Enterprise Linux 6. \n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nOpenSSH is OpenBSD\u0027s SSH (Secure Shell) protocol implementation. \nThese packages include the core files necessary for both the OpenSSH client\nand server. \n\nIt was discovered that OpenSSH clients did not correctly verify DNS SSHFP\nrecords. A malicious server could use this flaw to force a connecting\nclient to skip the DNS SSHFP record check and require the user to perform\nmanual host verification of the DNS SSHFP record. (CVE-2014-2653)\n\nIt was found that OpenSSH did not properly handle certain AcceptEnv\nparameter values with wildcard characters. (CVE-2014-2532)\n\nThis update also fixes the following bugs:\n\n* Based on the SP800-131A information security standard, the generation of\na digital signature using the Digital Signature Algorithm (DSA) with the\nkey size of 1024 bits and RSA with the key size of less than 2048 bits is\ndisallowed after the year 2013. After this update, ssh-keygen no longer\ngenerates keys with less than 2048 bits in FIPS mode. However, the sshd\nservice accepts keys of size 1024 bits as well as larger keys for\ncompatibility reasons. (BZ#993580)\n\n* Previously, the openssh utility incorrectly set the oom_adj value to -17\nfor all of its children processes. This behavior was incorrect because the\nchildren processes were supposed to have this value set to 0. This update\napplies a patch to fix this bug and oom_adj is now properly set to 0 for\nall children processes as expected. (BZ#1010429)\n\n* Previously, if the sshd service failed to verify the checksum of an\ninstalled FIPS module using the fipscheck library, the information about\nthis failure was only provided at the standard error output of sshd. As a\nconsequence, the user could not notice this message and be uninformed when\na system had not been properly configured for FIPS mode. To fix this bug,\nthis behavior has been changed and sshd now sends such messages via the\nsyslog service. (BZ#1020803)\n\n* When keys provided by the pkcs11 library were removed from the ssh agent\nusing the \"ssh-add -e\" command, the user was prompted to enter a PIN. \nWith this update, a patch has been applied to allow the user to remove the\nkeys provided by pkcs11 without the PIN. (BZ#1042519)\n\nIn addition, this update adds the following enhancements:\n\n* With this update, ControlPersist has been added to OpenSSH. The option in\nconjunction with the ControlMaster configuration directive specifies that\nthe master connection remains open in the background after the initial\nclient connection has been closed. (BZ#953088)\n\n* When the sshd daemon is configured to force the internal SFTP session,\nand the user attempts to use a connection other than SFTP, the appropriate\nmessage is logged to the /var/log/secure file. (BZ#997377)\n\n* Support for Elliptic Curve Cryptography modes for key exchange (ECDH) and\nhost user keys (ECDSA) as specified by RFC5656 has been added to the\nopenssh packages. However, they are not enabled by default and the user has\nto enable them manually. For more information on how to configure ECDSA and\nECDH with OpenSSH, see: https://access.redhat.com/solutions/711953\n(BZ#1028335)\n\nAll openssh users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add these\nenhancements. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n953088 - OpenSSH adding ControlPersist patch to enable full usage of SSH control options\n1010429 - Openssh Incorrectly sets oom_adj in all Children after Performing a Reload\n1023043 - ssh_config manual page lists incorrect default value of KexAlgorithms\n1023044 - Fix man page for ssh-keygen because of certificate support\n1027197 - X11 Forwarding does not work with default config - error: Failed to allocate internet-domain X11 display socket\n1028643 - Connection remains when fork() fails. \n1077843 - CVE-2014-2532 openssh: AcceptEnv environment restriction bypass flaw\n1081338 - CVE-2014-2653 openssh: failure to check DNS SSHFP records in certain scenarios\n1108836 - ssh-keyscan should ignore SIGPIPE\n1111568 - AUTOCREATE_SERVER_KEYS=RSAONLY is not supported by init script\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nopenssh-5.3p1-104.el6.src.rpm\n\ni386:\nopenssh-5.3p1-104.el6.i686.rpm\nopenssh-askpass-5.3p1-104.el6.i686.rpm\nopenssh-clients-5.3p1-104.el6.i686.rpm\nopenssh-debuginfo-5.3p1-104.el6.i686.rpm\nopenssh-server-5.3p1-104.el6.i686.rpm\n\nx86_64:\nopenssh-5.3p1-104.el6.x86_64.rpm\nopenssh-askpass-5.3p1-104.el6.x86_64.rpm\nopenssh-clients-5.3p1-104.el6.x86_64.rpm\nopenssh-debuginfo-5.3p1-104.el6.x86_64.rpm\nopenssh-server-5.3p1-104.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nopenssh-debuginfo-5.3p1-104.el6.i686.rpm\nopenssh-ldap-5.3p1-104.el6.i686.rpm\npam_ssh_agent_auth-0.9.3-104.el6.i686.rpm\n\nx86_64:\nopenssh-debuginfo-5.3p1-104.el6.i686.rpm\nopenssh-debuginfo-5.3p1-104.el6.x86_64.rpm\nopenssh-ldap-5.3p1-104.el6.x86_64.rpm\npam_ssh_agent_auth-0.9.3-104.el6.i686.rpm\npam_ssh_agent_auth-0.9.3-104.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nopenssh-5.3p1-104.el6.src.rpm\n\nx86_64:\nopenssh-5.3p1-104.el6.x86_64.rpm\nopenssh-clients-5.3p1-104.el6.x86_64.rpm\nopenssh-debuginfo-5.3p1-104.el6.x86_64.rpm\nopenssh-server-5.3p1-104.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nopenssh-askpass-5.3p1-104.el6.x86_64.rpm\nopenssh-debuginfo-5.3p1-104.el6.i686.rpm\nopenssh-debuginfo-5.3p1-104.el6.x86_64.rpm\nopenssh-ldap-5.3p1-104.el6.x86_64.rpm\npam_ssh_agent_auth-0.9.3-104.el6.i686.rpm\npam_ssh_agent_auth-0.9.3-104.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nopenssh-5.3p1-104.el6.src.rpm\n\ni386:\nopenssh-5.3p1-104.el6.i686.rpm\nopenssh-askpass-5.3p1-104.el6.i686.rpm\nopenssh-clients-5.3p1-104.el6.i686.rpm\nopenssh-debuginfo-5.3p1-104.el6.i686.rpm\nopenssh-server-5.3p1-104.el6.i686.rpm\n\nppc64:\nopenssh-5.3p1-104.el6.ppc64.rpm\nopenssh-askpass-5.3p1-104.el6.ppc64.rpm\nopenssh-clients-5.3p1-104.el6.ppc64.rpm\nopenssh-debuginfo-5.3p1-104.el6.ppc64.rpm\nopenssh-server-5.3p1-104.el6.ppc64.rpm\n\ns390x:\nopenssh-5.3p1-104.el6.s390x.rpm\nopenssh-askpass-5.3p1-104.el6.s390x.rpm\nopenssh-clients-5.3p1-104.el6.s390x.rpm\nopenssh-debuginfo-5.3p1-104.el6.s390x.rpm\nopenssh-server-5.3p1-104.el6.s390x.rpm\n\nx86_64:\nopenssh-5.3p1-104.el6.x86_64.rpm\nopenssh-askpass-5.3p1-104.el6.x86_64.rpm\nopenssh-clients-5.3p1-104.el6.x86_64.rpm\nopenssh-debuginfo-5.3p1-104.el6.x86_64.rpm\nopenssh-server-5.3p1-104.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nopenssh-debuginfo-5.3p1-104.el6.i686.rpm\nopenssh-ldap-5.3p1-104.el6.i686.rpm\npam_ssh_agent_auth-0.9.3-104.el6.i686.rpm\n\nppc64:\nopenssh-debuginfo-5.3p1-104.el6.ppc.rpm\nopenssh-debuginfo-5.3p1-104.el6.ppc64.rpm\nopenssh-ldap-5.3p1-104.el6.ppc64.rpm\npam_ssh_agent_auth-0.9.3-104.el6.ppc.rpm\npam_ssh_agent_auth-0.9.3-104.el6.ppc64.rpm\n\ns390x:\nopenssh-debuginfo-5.3p1-104.el6.s390.rpm\nopenssh-debuginfo-5.3p1-104.el6.s390x.rpm\nopenssh-ldap-5.3p1-104.el6.s390x.rpm\npam_ssh_agent_auth-0.9.3-104.el6.s390.rpm\npam_ssh_agent_auth-0.9.3-104.el6.s390x.rpm\n\nx86_64:\nopenssh-debuginfo-5.3p1-104.el6.i686.rpm\nopenssh-debuginfo-5.3p1-104.el6.x86_64.rpm\nopenssh-ldap-5.3p1-104.el6.x86_64.rpm\npam_ssh_agent_auth-0.9.3-104.el6.i686.rpm\npam_ssh_agent_auth-0.9.3-104.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nopenssh-5.3p1-104.el6.src.rpm\n\ni386:\nopenssh-5.3p1-104.el6.i686.rpm\nopenssh-askpass-5.3p1-104.el6.i686.rpm\nopenssh-clients-5.3p1-104.el6.i686.rpm\nopenssh-debuginfo-5.3p1-104.el6.i686.rpm\nopenssh-server-5.3p1-104.el6.i686.rpm\n\nx86_64:\nopenssh-5.3p1-104.el6.x86_64.rpm\nopenssh-askpass-5.3p1-104.el6.x86_64.rpm\nopenssh-clients-5.3p1-104.el6.x86_64.rpm\nopenssh-debuginfo-5.3p1-104.el6.x86_64.rpm\nopenssh-server-5.3p1-104.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nopenssh-debuginfo-5.3p1-104.el6.i686.rpm\nopenssh-ldap-5.3p1-104.el6.i686.rpm\npam_ssh_agent_auth-0.9.3-104.el6.i686.rpm\n\nx86_64:\nopenssh-debuginfo-5.3p1-104.el6.i686.rpm\nopenssh-debuginfo-5.3p1-104.el6.x86_64.rpm\nopenssh-ldap-5.3p1-104.el6.x86_64.rpm\npam_ssh_agent_auth-0.9.3-104.el6.i686.rpm\npam_ssh_agent_auth-0.9.3-104.el6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2014-2532.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-2653.html\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/solutions/711953\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFUPK1zXlSAg2UNWIIRAgLFAKCbc0zGun3IBr/70ChlueemUsEORgCfa8RL\nIT6RfneDJRTv3j8EqBZSrp0=\n=33Fn\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201405-06\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: OpenSSH: Multiple vulnerabilities\n Date: May 11, 2014\n Bugs: #231292, #247466, #386307, #410869, #419357, #456006, #505066\n ID: 201405-06\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in OpenSSH, the worst of which\nmay allow remote attackers to execute arbitrary code. Please review\nthe CVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll OpenSSH users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/openssh-6.6_p1-r1\"\n\nNOTE: One or more of the issues described in this advisory have been\nfixed in previous updates. They are included in this advisory for the\nsake of completeness. It is likely that your system is already no\nlonger affected by them. \n\nReferences\n==========\n\n[ 1 ] CVE-2008-5161\n http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5161\n[ 2 ] CVE-2010-4478\n http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4478\n[ 3 ] CVE-2010-4755\n http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4755\n[ 4 ] CVE-2010-5107\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5107\n[ 5 ] CVE-2011-5000\n http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-5000\n[ 6 ] CVE-2012-0814\n http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0814\n[ 7 ] CVE-2014-2532\n http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2532\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201405-06.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2015-09-30-3 OS X El Capitan 10.11\n\nOS X El Capitan 10.11 is now available and addresses the following:\n\nAddress Book\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local attacker may be able to inject arbitrary code to\nprocesses loading the Address Book framework\nDescription: An issue existed in Address Book framework\u0027s handling\nof an environment variable. This issue was addressed through improved\nenvironment variable handling. \nCVE-ID\nCVE-2015-5897 : Dan Bastone of Gotham Digital Science\n\nAirScan\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker with a privileged network position may be able\nto extract payload from eSCL packets sent over a secure connection\nDescription: An issue existed in the processing of eSCL packets. \nThis issue was addressed through improved validation checks. \nCVE-ID\nCVE-2015-5853 : an anonymous researcher\n\napache_mod_php\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in PHP\nDescription: Multiple vulnerabilities existed in PHP versions prior\nto 5.5.27, including one which may have led to remote code execution. \nThis issue was addressed by updating PHP to version 5.5.27. \nCVE-ID\nCVE-2014-9425\nCVE-2014-9427\nCVE-2014-9652\nCVE-2014-9705\nCVE-2014-9709\nCVE-2015-0231\nCVE-2015-0232\nCVE-2015-0235\nCVE-2015-0273\nCVE-2015-1351\nCVE-2015-1352\nCVE-2015-2301\nCVE-2015-2305\nCVE-2015-2331\nCVE-2015-2348\nCVE-2015-2783\nCVE-2015-2787\nCVE-2015-3329\nCVE-2015-3330\n\nApple Online Store Kit\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious application may gain access to a user\u0027s keychain\nitems\nDescription: An issue existed in validation of access control lists\nfor iCloud keychain items. This issue was addressed through improved\naccess control list checks. \nCVE-ID\nCVE-2015-5836 : XiaoFeng Wang of Indiana University, Luyi Xing of\nIndiana University, Tongxin Li of Peking University, Tongxin Li of\nPeking University, Xiaolong Bai of Tsinghua University\n\nAppleEvents\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A user connected through screen sharing can send Apple\nEvents to a local user\u0027s session\nDescription: An issue existed with Apple Event filtering that\nallowed some users to send events to other users. This was addressed\nby improved Apple Event handling. \nCVE-ID\nCVE-2015-5849 : Jack Lawrence (@_jackhl)\n\nAudio\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Playing a malicious audio file may lead to an unexpected\napplication termination\nDescription: A memory corruption issue existed in the handling of\naudio files. This issue issue was addressed through improved memory\nhandling. \nCVE-ID\nCVE-2015-5862 : YoungJin Yoon of Information Security Lab. (Adv.:\nProf. Taekyoung Kwon), Yonsei University, Seoul, Korea\n\nbash\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in bash\nDescription: Multiple vulnerabilities existed in bash versions prior\nto 3.2 patch level 57. These issues were addressed by updating bash\nversion 3.2 to patch level 57. \nCVE-ID\nCVE-2014-6277\nCVE-2014-7186\nCVE-2014-7187\n\nCertificate Trust Policy\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Update to the certificate trust policy\nDescription: The certificate trust policy was updated. The complete\nlist of certificates may be viewed at https://support.apple.com/en-\nus/HT202858. \n\nCFNetwork Cookies\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker in a privileged network position can track a\nuser\u0027s activity\nDescription: A cross-domain cookie issue existed in the handling of\ntop level domains. The issue was address through improved\nrestrictions of cookie creation. \nCVE-ID\nCVE-2015-5885 : Xiaofeng Zheng of Blue Lotus Team, Tsinghua\nUniversity\n\nCFNetwork FTPProtocol\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Malicious FTP servers may be able to cause the client to\nperform reconnaissance on other hosts\nDescription: An issue existed in the handling of FTP packets when\nusing the PASV command. This issue was resolved through improved\nvalidation. \nCVE-ID\nCVE-2015-5912 : Amit Klein\n\nCFNetwork HTTPProtocol\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A maliciously crafted URL may be able to bypass HSTS and\nleak sensitive data\nDescription: A URL parsing vulnerability existed in HSTS handling. \nThis issue was addressed through improved URL parsing. \nCVE-ID\nCVE-2015-5858 : Xiaofeng Zheng of Blue Lotus Team, Tsinghua\nUniversity\n\nCFNetwork HTTPProtocol\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious website may be able to track users in Safari\nprivate browsing mode\nDescription: An issue existed in the handling of HSTS state in\nSafari private browsing mode. This issue was addressed through\nimproved state handling. \nCVE-ID\nCVE-2015-5860 : Sam Greenhalgh of RadicalResearch Ltd\n\nCFNetwork Proxies\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Connecting to a malicious web proxy may set malicious\ncookies for a website\nDescription: An issue existed in the handling of proxy connect\nresponses. This issue was addressed by removing the set-cookie header\nwhile parsing the connect response. \nCVE-ID\nCVE-2015-5841 : Xiaofeng Zheng of Blue Lotus Team, Tsinghua\nUniversity\n\nCFNetwork SSL\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker with a privileged network position may intercept\nSSL/TLS connections\nDescription: A certificate validation issue existed in NSURL when a\ncertificate changed. This issue was addressed through improved\ncertificate validation. \nCVE-ID\nCVE-2015-5824 : Timothy J. Wood of The Omni Group\n\nCFNetwork SSL\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker may be able to decrypt data protected by SSL\nDescription: There are known attacks on the confidentiality of RC4. \nAn attacker could force the use of RC4, even if the server preferred\nbetter ciphers, by blocking TLS 1.0 and higher connections until\nCFNetwork tried SSL 3.0, which only allows RC4. This issue was\naddressed by removing the fallback to SSL 3.0. \n\nCoreCrypto\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker may be able to determine a private key\nDescription: By observing many signing or decryption attempts, an\nattacker may have been able to determine the RSA private key. This\nissue was addressed using improved encryption algorithms. \n\nCoreText\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: A memory corruption issue existed in the processing of\nfont files. This issue was addressed through improved input\nvalidation. \nCVE-ID\nCVE-2015-5874 : John Villamil (@day6reak), Yahoo Pentest Team\n\nDev Tools\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: A memory corruption issue existed in dyld. This was\naddressed through improved memory handling. \nCVE-ID\nCVE-2015-5876 : beist of grayhash\n\nDev Tools\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An application may be able to bypass code signing\nDescription: An issue existed with validation of the code signature\nof executables. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2015-5839 : @PanguTeam\n\nDisk Images\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue existed in DiskImages. This\nissue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-5847 : Filippo Bigarella, Luca Todesco\n\ndyld\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An application may be able to bypass code signing\nDescription: An issue existed with validation of the code signature\nof executables. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2015-5839 : TaiG Jailbreak Team\n\nEFI\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious application can prevent some systems from\nbooting\nDescription: An issue existed with the addresses covered by the\nprotected range register. This issue was fixed by changing the\nprotected range. \nCVE-ID\nCVE-2015-5900 : Xeno Kovah \u0026 Corey Kallenberg from LegbaCore\n\nEFI\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious Apple Ethernet Thunderbolt adapter may be able\nto affect firmware flashing\nDescription: Apple Ethernet Thunderbolt adapters could modify the\nhost firmware if connected during an EFI update. This issue was\naddressed by not loading option ROMs during updates. \nCVE-ID\nCVE-2015-5914 : Trammell Hudson of Two Sigma Investments and snare\n\nFinder\nAvailable for: Mac OS X v10.6.8 and later\nImpact: The \"Secure Empty Trash\" feature may not securely delete\nfiles placed in the Trash\nDescription: An issue existed in guaranteeing secure deletion of\nTrash files on some systems, such as those with flash storage. This\nissue was addressed by removing the \"Secure Empty Trash\" option. \nCVE-ID\nCVE-2015-5901 : Apple\n\nGame Center\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious Game Center application may be able to access a\nplayer\u0027s email address\nDescription: An issue existed in Game Center in the handling of a\nplayer\u0027s email. This issue was addressed through improved access\nrestrictions. \nCVE-ID\nCVE-2015-5855 : Nasser Alnasser\n\nHeimdal\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker may be able to replay Kerberos credentials to\nthe SMB server\nDescription: An authentication issue existed in Kerberos\ncredentials. This issue was addressed through additional validation\nof credentials using a list of recently seen credentials. \nCVE-ID\nCVE-2015-5913 : Tarun Chopra of Microsoft Corporation, U.S. and Yu\nFan of Microsoft Corporation, China\n\nICU\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in ICU\nDescription: Multiple vulnerabilities existed in ICU versions prior\nto 53.1.0. These issues were addressed by updating ICU to version\n55.1. \nCVE-ID\nCVE-2014-8146\nCVE-2014-8147\nCVE-2015-5922\n\nInstall Framework Legacy\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to gain root privileges\nDescription: A restriction issue existed in the Install private\nframework containing a privileged executable. This issue was\naddressed by removing the executable. \nCVE-ID\nCVE-2015-5888 : Apple\n\nIntel Graphics Driver\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: Multiple memory corruption issues existed in the Intel\nGraphics Driver. These issues were addressed through improved memory\nhandling. \nCVE-ID\nCVE-2015-5830 : Yuki MIZUNO (@mzyy94)\nCVE-2015-5877 : Camillus Gerard Cai\n\nIOAudioFamily\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to determine kernel memory layout\nDescription: An issue existed in IOAudioFamily that led to the\ndisclosure of kernel memory content. This issue was addressed by\npermuting kernel pointers. \nCVE-ID\nCVE-2015-5864 : Luca Todesco\n\nIOGraphics\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues existed in the\nkernel. These issues were addressed through improved memory handling. \nCVE-ID\nCVE-2015-5871 : Ilja van Sprundel of IOActive\nCVE-2015-5872 : Ilja van Sprundel of IOActive\nCVE-2015-5873 : Ilja van Sprundel of IOActive\nCVE-2015-5890 : Ilja van Sprundel of IOActive\n\nIOGraphics\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: An issue existed in IOGraphics which could have led to\nthe disclosure of kernel memory layout. This issue was addressed\nthrough improved memory management. \nCVE-ID\nCVE-2015-5865 : Luca Todesco\n\nIOHIDFamily\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: Multiple memory corruption issues existed in\nIOHIDFamily. These issues were addressed through improved memory\nhandling. \nCVE-ID\nCVE-2015-5866 : Apple\nCVE-2015-5867 : moony li of Trend Micro\n\nIOStorageFamily\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local attacker may be able to read kernel memory\nDescription: A memory initialization issue existed in the kernel. \nThis issue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-5863 : Ilja van Sprundel of IOActive\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues existed in the\nKernel. These issues were addressed through improved memory handling. \nCVE-ID\nCVE-2015-5868 : Cererdlong of Alibaba Mobile Security Team\nCVE-2015-5896 : Maxime Villard of m00nbsd\nCVE-2015-5903 : CESG\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local process can modify other processes without\nentitlement checks\nDescription: An issue existed where root processes using the\nprocessor_set_tasks API were allowed to retrieve the task ports of\nother processes. This issue was addressed through additional\nentitlement checks. \nCVE-ID\nCVE-2015-5882 : Pedro Vilaca, working from original research by\nMing-chieh Pan and Sung-ting Tsai; Jonathan Levin\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local attacker may control the value of stack cookies\nDescription: Multiple weaknesses existed in the generation of user\nspace stack cookies. These issues were addressed through improved\ngeneration of stack cookies. \nCVE-ID\nCVE-2013-3951 : Stefan Esser\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker may be able to launch denial of service attacks\non targeted TCP connections without knowing the correct sequence\nnumber\nDescription: An issue existed in xnu\u0027s validation of TCP packet\nheaders. This issue was addressed through improved TCP packet header\nvalidation. \nCVE-ID\nCVE-2015-5879 : Jonathan Looney\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker in a local LAN segment may disable IPv6 routing\nDescription: An insufficient validation issue existed in the\nhandling of IPv6 router advertisements that allowed an attacker to\nset the hop limit to an arbitrary value. This issue was addressed by\nenforcing a minimum hop limit. \nCVE-ID\nCVE-2015-5869 : Dennis Spindel Ljungmark\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to determine kernel memory layout\nDescription: An issue existed that led to the disclosure of kernel\nmemory layout. This was addressed through improved initialization of\nkernel memory structures. \nCVE-ID\nCVE-2015-5842 : beist of grayhash\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to determine kernel memory layout\nDescription: An issue existed in debugging interfaces that led to\nthe disclosure of memory content. This issue was addressed by\nsanitizing output from debugging interfaces. \nCVE-ID\nCVE-2015-5870 : Apple\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to cause a system denial of service\nDescription: A state management issue existed in debugging\nfunctionality. This issue was addressed through improved validation. \nCVE-ID\nCVE-2015-5902 : Sergi Alvarez (pancake) of NowSecure Research Team\n\nlibc\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue existed in the kernel. This\nissue was addressed through improved memory handling. \nCVE-ID\nCVE-2014-8611 : Adrian Chadd and Alfred Perlstein of Norse\nCorporation\n\nlibpthread\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue existed in the kernel. This\nissue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-5899 : Lufeng Li of Qihoo 360 Vulcan Team\n\nlibxpc\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Many SSH connections could cause a denial of service\nDescription: launchd had no limit on the number of processes that\ncould be started by a network connection. This issue was addressed by\nlimiting the number of SSH processes to 40. \nCVE-ID\nCVE-2015-5881 : Apple\n\nLogin Window\nAvailable for: Mac OS X v10.6.8 and later\nImpact: The screen lock may not engage after the specified time\nperiod\nDescription: An issue existed with captured display locking. The\nissue was addressed through improved lock handling. \nCVE-ID\nCVE-2015-5833 : Carlos Moreira, Rainer Dorau of rainer dorau\ninformationsdesign, Chris Nehren, Kai Takac, Hans Douma, Toni\nVaahtera, and an anonymous researcher\n\nlukemftpd\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A remote attacker may be able to deny service to the FTP\nserver\nDescription: A glob-processing issue existed in tnftpd. This issue\nwas addressed through improved glob validation. \nCVE-ID\nCVE-2015-5917 : Maksymilian Arciemowicz of cxsecurity.com\n\nMail\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Printing an email may leak sensitive user information\nDescription: An issue existed in Mail which bypassed user\npreferences when printing an email. This issue was addressed through\nimproved user preference enforcement. \nCVE-ID\nCVE-2015-5881 : Owen DeLong of Akamai Technologies, Noritaka Kamiya,\nDennis Klein from Eschenburg, Germany, Jeff Hammett of Systim\nTechnology Partners\n\nMail\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker in a privileged network position may be able to\nintercept attachments of S/MIME-encrypted e-mail sent via Mail Drop\nDescription: An issue existed in handling encryption parameters for\nlarge email attachments sent via Mail Drop. The issue is addressed by\nno longer offering Mail Drop when sending an encrypted e-mail. \nCVE-ID\nCVE-2015-5884 : John McCombs of Integrated Mapping Ltd\n\nMultipeer Connectivity\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local attacker may be able to observe unprotected\nmultipeer data\nDescription: An issue existed in convenience initializer handling in\nwhich encryption could be actively downgraded to a non-encrypted\nsession. This issue was addressed by changing the convenience\ninitializer to require encryption. \nCVE-ID\nCVE-2015-5851 : Alban Diquet (@nabla_c0d3) of Data Theorem\n\nNetworkExtension\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: An uninitialized memory issue in the kernel led to the\ndisclosure of kernel memory content. This issue was addressed through\nimproved memory initialization. \nCVE-ID\nCVE-2015-5831 : Maxime Villard of m00nbsd\n\nNotes\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to leak sensitive user information\nDescription: An issue existed in parsing links in the Notes\napplication. This issue was addressed through improved input\nvalidation. \nCVE-ID\nCVE-2015-5878 : Craig Young of Tripwire VERT, an anonymous researcher\n\nNotes\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to leak sensitive user information\nDescription: A cross-site scripting issue existed in parsing text by\nthe Notes application. This issue was addressed through improved\ninput validation. \nCVE-ID\nCVE-2015-5875 : xisigr of Tencent\u0027s Xuanwu LAB (www.tencent.com)\n\nOpenSSH\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in OpenSSH\nDescription: Multiple vulnerabilities existed in OpenSSH versions\nprior to 6.9. These issues were addressed by updating OpenSSH to\nversion 6.9. \nCVE-ID\nCVE-2014-2532\n\nOpenSSL\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in OpenSSL\nDescription: Multiple vulnerabilities existed in OpenSSL versions\nprior to 0.9.8zg. These were addressed by updating OpenSSL to version\n0.9.8zg. \nCVE-ID\nCVE-2015-0286\nCVE-2015-0287\n\nprocmail\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in procmail\nDescription: Multiple vulnerabilities existed in procmail versions\nprior to 3.22. These issues were addressed by removing procmail. \nCVE-ID\nCVE-2014-3618\n\nremote_cmds\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with root\nprivileges\nDescription: An issue existed in the usage of environment variables\nby the rsh binary. This issue was addressed by dropping setuid\nprivileges from the rsh binary. \nCVE-ID\nCVE-2015-5889 : Philip Pettersson\n\nremovefile\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Processing malicious data may lead to unexpected application\ntermination\nDescription: An overflow fault existed in the checkint division\nroutines. This issue was addressed with improved division routines. \nCVE-ID\nCVE-2015-5840 : an anonymous researcher\n\nRuby\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in Ruby\nDescription: Multiple vulnerabilities existed in Ruby versions prior\nto 2.0.0p645. These were addressed by updating Ruby to version\n2.0.0p645. \nCVE-ID\nCVE-2014-8080\nCVE-2014-8090\nCVE-2015-1855\n\nSecurity\nAvailable for: Mac OS X v10.6.8 and later\nImpact: The lock state of the keychain may be incorrectly displayed\nto the user\nDescription: A state management issue existed in the way keychain\nlock status was tracked. This issue was addressed through improved\nstate management. \nCVE-ID\nCVE-2015-5915 : Peter Walz of University of Minnesota, David Ephron,\nEric E. Lawrence, Apple\n\nSecurity\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A trust evaluation configured to require revocation checking\nmay succeed even if revocation checking fails\nDescription: The kSecRevocationRequirePositiveResponse flag was\nspecified but not implemented. This issue was addressed by\nimplementing the flag. \nCVE-ID\nCVE-2015-5894 : Hannes Oud of kWallet GmbH\n\nSecurity\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A remote server may prompt for a certificate before\nidentifying itself\nDescription: Secure Transport accepted the CertificateRequest\nmessage before the ServerKeyExchange message. This issue was\naddressed by requiring the ServerKeyExchange first. \nCVE-ID\nCVE-2015-5887 : Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine\nDelignat-Lavaud, Alfredo Pironti, and Jean Karim Zinzindohoue of\nINRIA Paris-Rocquencourt, and Cedric Fournet and Markulf Kohlweiss of\nMicrosoft Research, Pierre-Yves Strub of IMDEA Software Institute\n\nSMB\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue existed in the kernel. This\nissue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-5891 : Ilja van Sprundel of IOActive\n\nSMB\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to determine kernel memory layout\nDescription: An issue existed in SMBClient that led to the\ndisclosure of kernel memory content. This issue was addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2015-5893 : Ilja van Sprundel of IOActive\n\nSQLite\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in SQLite v3.8.5\nDescription: Multiple vulnerabilities existed in SQLite v3.8.5. \nThese issues were addressed by updating SQLite to version 3.8.10.2. \nCVE-ID\nCVE-2015-3414\nCVE-2015-3415\nCVE-2015-3416\n\nTelephony\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local attacker can place phone calls without the user\u0027s\nknowledge when using Continuity\nDescription: An issue existed in the authorization checks for\nplacing phone calls. This issue was addressed through improved\nauthorization checks. \nCVE-ID\nCVE-2015-3785 : Dan Bastone of Gotham Digital Science\n\nTerminal\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Maliciously crafted text could mislead the user in Terminal\nDescription: Terminal did not handle bidirectional override\ncharacters in the same way when displaying text and when selecting\ntext. This issue was addressed by suppressing bidirectional override\ncharacters in Terminal. \nCVE-ID\nCVE-2015-5883 : an anonymous researcher\n\ntidy\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Visiting a maliciously crafted website may lead to arbitrary\ncode execution\nDescription: Multiple memory corruption issues existed in tidy. \nThese issues were addressed through improved memory handling. \nCVE-ID\nCVE-2015-5522 : Fernando Munoz of NULLGroup.com\nCVE-2015-5523 : Fernando Munoz of NULLGroup.com\n\nTime Machine\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local attacker may gain access to keychain items\nDescription: An issue existed in backups by the Time Machine\nframework. This issue was addressed through improved coverage of Time\nMachine backups. \nCVE-ID\nCVE-2015-5854 : Jonas Magazinius of Assured AB\n\nNote: OS X El Capitan 10.11 includes the security content of\nSafari 9: https://support.apple.com/kb/HT205265. \n\nOS X El Capitan 10.11 may be obtained from the Mac App Store:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - http://gpgtools.org\n\niQIcBAEBCAAGBQJWDB2wAAoJEBcWfLTuOo7t0sYP/2L3JOGPkHH8XUh2YHpu5qaw\nS5F2v+SRpWleKQBVsGZ7oA8PV0rBTzEkzt8K1tNxYmxEqL9f/TpRiGoforn89thO\n/hOtmVOfUcBjPZ4XKwMVzycfSMC9o6LxWTLEKDVylE+F+5jkXafOC9QaqD11dxX6\nQhENkpS1BwrKhyaSVxEcgBQtZM9aTsVdZ78rTCb9XTn6gDnvs8NfIQquFOnaQT54\nYJ36e5UcUsnyBIol+yGDbC3ZEhzSVIGE5/8/NFlFfRXLgnJArxD8lqz8WdfU9fop\nhpT/dDqqAdYbRcW1ihcG1haiNHgP9yQCY5jRNfttb+Tc/kIi/QmPkEO0QS8Ygt/O\nc3sUbNulr1LCinymFVwx16CM1DplGS/GmBL18BAEBnL6yi9tEhYDynZWLSEa37VR\n8q802rXRSF10Wct9/kEeR4HgY/1k0KK/4Uddm3c0YyOU21ya7NAhoHGwmDa9g11r\nN1TniOK8tPiCGjRNOJwuF6DKxD9L3Fv44bVlxAarGUGYkICqzaNS+bgKI1aQNahT\nfJ91x5uKD4+L9v9c5slkoDIvWqIhO9oyuxgnmC5GstkwFplFXSOklLkTktjLGNn1\nnJq8cPnZ/3E1RXTEwVhGljYw5pdZHNx98XmLomGrPqVlZfjGURK+5AXdf2pOlt2e\ng6jld/w5tPuCFhGucE7Z\n=XciV\n-----END PGP SIGNATURE-----\n. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2653\n http://advisories.mageia.org/MGASA-2014-0143.html\n http://advisories.mageia.org/MGASA-2014-0166.html\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n 753bd40deb60429adc6a7c1afd63ee3d mbs1/x86_64/openssh-5.9p1-6.3.mbs1.x86_64.rpm\n 377e7fbb14f72a1e32da41f19be7baa8 mbs1/x86_64/openssh-askpass-5.9p1-6.3.mbs1.x86_64.rpm\n a906db623fc8d56eab9b8b99b1af84d9 mbs1/x86_64/openssh-askpass-common-5.9p1-6.3.mbs1.x86_64.rpm\n 9fc03d4929efdf21a26aef308eb66f14 mbs1/x86_64/openssh-askpass-gnome-5.9p1-6.3.mbs1.x86_64.rpm\n f2dbea4a0a8109bc835c69e871f07a69 mbs1/x86_64/openssh-clients-5.9p1-6.3.mbs1.x86_64.rpm\n a20d329b8332ff7f7f10dd541a3865a9 mbs1/x86_64/openssh-server-5.9p1-6.3.mbs1.x86_64.rpm \n 0fd2c0a9338a7e8e8747c2ea3ae43c49 mbs1/SRPMS/openssh-5.9p1-6.3.mbs1.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. The Common Vulnerabilities and Exposures project\nidentifies the following problems:\n\nCVE-2014-2532\n\n Jann Horn discovered that OpenSSH incorrectly handled wildcards in\n AcceptEnv lines. \n\nCVE-2014-2653\n\n Matthew Vernon reported that if a SSH server offers a\n HostCertificate that the ssh client doesn\u0027t accept, then the client\n doesn\u0027t check the DNS for SSHFP records. As a consequence a\n malicious server can disable SSHFP-checking by presenting a\n certificate. \n\n Note that a host verification prompt is still displayed before\n connecting. \n\nFor the oldstable distribution (squeeze), these problems have been fixed in\nversion 1:5.5p1-6+squeeze5. \n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 1:6.0p1-4+deb7u1. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1:6.6p1-1. \n\nWe recommend that you upgrade your openssh packages. ============================================================================\nUbuntu Security Notice USN-2155-1\nMarch 25, 2014\n\nopenssh vulnerability\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 13.10\n- Ubuntu 12.10\n- Ubuntu 12.04 LTS\n- Ubuntu 10.04 LTS\n\nSummary:\n\nOpenSSH incorrectly handled environment restrictions with wildcards. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 13.10:\n openssh-server 1:6.2p2-6ubuntu0.2\n\nUbuntu 12.10:\n openssh-server 1:6.0p1-3ubuntu1.1\n\nUbuntu 12.04 LTS:\n openssh-server 1:5.9p1-5ubuntu1.2\n\nUbuntu 10.04 LTS:\n openssh-server 1:5.3p1-3ubuntu7.1\n\nIn general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04499681\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04499681\nVersion: 1\n\nHPSBUX03188 SSRT101487 rev.1 - HP-UX running HP Secure Shell, Remote Denial\nof Service (DoS) and other Vulnerabilities\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2014-11-07\nLast Updated: 2014-11-07\n\nPotential Security Impact: Remote Denial of Service (DoS) and other\nvulnerabilities\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP-UX running HP\nSecure Shell. These vulnerabilities could be exploited remotely to create a\nDenial of Service (DoS) and other vulnerabilities. \n\nReferences:\n\nCVE-2013-4548 - remote Permissions, Privileges, and Access Control (CWE-264)\n\nCVE-2014-1692 - remote Denial of Service (DoS), Buffer Errors (CWE-119)\n\nCVE-2014-2532 - remote Permissions, Privileges, and Access Control (CWE-264)\n\nCVE-2014-2653 - remote Input Validation (CWE-20)\n\nSSRT101487\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX B.11.11 running HP Secure Shell before version A.06.20.010\n\nHP-UX B.11.23 running HP Secure Shell before version A.06.20.011\n\nHP-UX B.11.31 running HP Secure Shell before version A.06.20.012\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2013-4548 (AV:N/AC:M/Au:S/C:P/I:P/A:P) 6.0\nCVE-2014-1692 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2014-2532 (AV:N/AC:M/Au:N/C:P/I:P/A:N) 5.8\nCVE-2014-2653 (AV:N/AC:M/Au:N/C:P/I:P/A:N) 5.8\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following software updates to resolve this vulnerability. \nThe updates are available for download from:\nhttp://h20293.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=\nT1471AA\n\nOS Release\n HP Secure Shell Version\n Depot Name\n\nHP-UX B.11.11 (11i v1)\n A.06.20.010 or subsequent\n HP_UX_11i_v1_T1471AA_A.06.20.010_HP-UX_B.11.11_32_64.depot\n\nHP-UX B.11.23 (11i v2)\n A.06.20.011 or subsequent\n HP_UX_11i_v2_T1471AA_A.06.20.011_HP-UX_B.11.23_IA_PA.depot\n\nHP-UX B.11.31 (11i v3)\n A.06.20.012 or subsequent\n HP_UX_11i_v3_SecureShell_A.06.20.012_HP-UX_B.11.31_IA_PA.depot\n\nMANUAL ACTIONS: Yes - Update\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant:\nHP-UX Software Assistant is an enhanced application that replaces HP-UX\nSecurity Patch Check. It analyzes all HP-issued Security Bulletins and lists\nrecommended actions that may apply to a specific HP-UX system. It can also\ndownload patches and create a depot automatically. For more information see:\nhttps://www.hp.com/go/swa\n\nAFFECTED VERSIONS\n\nHP-UX B.11.11\n==============\nSecure_Shell.SECURE_SHELL\naction: install revision A.06.20.010 or subsequent\n\nHP-UX B.11.23\n==============\nSecure_Shell.SECSH-CMN\nSecure_Shell.SECURE_SHELL\naction: install revision A.06.20.011 or subsequent\n\nHP-UX B.11.31\n==============\nSecure_Shell.SECSH-CMN\nSecure_Shell.SECURE_SHELL\naction: install revision A.06.20.012 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY: Version:1 (rev.1) - 7 November 2014 Initial Release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners", "sources": [ { "db": "NVD", "id": "CVE-2014-2532" }, { "db": "BID", "id": "66355" }, { "db": "VULMON", "id": "CVE-2014-2532" }, { "db": "PACKETSTORM", "id": "128654" }, { "db": "PACKETSTORM", "id": "126580" }, { "db": "PACKETSTORM", "id": "133803" }, { "db": "PACKETSTORM", "id": "126075" }, { "db": "PACKETSTORM", "id": "131103" }, { "db": "PACKETSTORM", "id": "126023" }, { "db": "PACKETSTORM", "id": "125859" }, { "db": "PACKETSTORM", "id": "129077" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-2532", "trust": 2.8 }, { "db": "BID", "id": "66355", "trust": 1.4 }, { "db": "SECUNIA", "id": "59855", "trust": 1.1 }, { "db": "SECUNIA", "id": "59313", "trust": 1.1 }, { "db": "SECUNIA", "id": "57488", "trust": 1.1 }, { "db": "SECUNIA", "id": "57574", "trust": 1.1 }, { "db": "SECTRACK", "id": "1029925", "trust": 1.1 }, { "db": "MLIST", "id": "[SECURITY-ANNOUNCE] 20140315 ANNOUNCE: OPENSSH 6.6 RELEASED", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201403-336", "trust": 0.6 }, { "db": "JUNIPER", "id": "JSA10661", "trust": 0.3 }, { "db": "VULMON", "id": "CVE-2014-2532", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "128654", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "126580", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "133803", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "126075", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131103", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "126023", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "125859", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129077", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-2532" }, { "db": "BID", "id": "66355" }, { "db": "PACKETSTORM", "id": "128654" }, { "db": "PACKETSTORM", "id": "126580" }, { "db": "PACKETSTORM", "id": "133803" }, { "db": "PACKETSTORM", "id": "126075" }, { "db": "PACKETSTORM", "id": "131103" }, { "db": "PACKETSTORM", "id": "126023" }, { "db": "PACKETSTORM", "id": "125859" }, { "db": "PACKETSTORM", "id": "129077" }, { "db": "CNNVD", "id": "CNNVD-201403-336" }, { "db": "NVD", "id": "CVE-2014-2532" } ] }, "id": "VAR-201403-0275", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4440100783333334 }, "last_update_date": "2024-07-23T20:15:55.666000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "openssh-6.6", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=48725" }, { "title": "Ubuntu Security Notice: openssh vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-2155-1" }, { "title": "Debian CVElist Bug Report Logs: If server offers certificate, doesn\u0027t fall back to checking SSHFP records (CVE-2014-2653)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=e2b29b5960fd84d7d2fed1e9bad51e83" }, { "title": "Debian Security Advisories: DSA-2894-1 openssh -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=097ff1ee5afacf7965034aa9b90de6de" }, { "title": "Amazon Linux AMI: ALAS-2014-369", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2014-369" }, { "title": "Brocade Security Advisories: BSA-2017-253", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=brocade_security_advisories\u0026qid=2d463347de7f8b5b2483cc00eb7338bc" }, { "title": "Symantec Security Advisories: SA104 : OpenSSH Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=b643e473a764678a8d1ded300d5699b6" }, { "title": "Apple: OS X El Capitan v10.11", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=e88bab658248444f5dffc23fd95859e7" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - April 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=122319027ae43d6d626710f1b1bb1d43" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - October 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=05aabe19d38058b7814ef5514aab4c0c" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=5f8c525f1408011628af1792207b2099" } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-2532" }, { "db": "CNNVD", "id": "CNNVD-201403-336" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2014-2532" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://marc.info/?l=openbsd-security-announce\u0026m=139492048027313\u0026w=2" }, { "trust": 1.4, "url": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc" }, { "trust": 1.4, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "trust": 1.3, "url": "http://advisories.mageia.org/mgasa-2014-0143.html" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2014-1552.html" }, { "trust": 1.2, "url": "http://www.ubuntu.com/usn/usn-2155-1" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2015/sep/msg00008.html" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-june/134026.html" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-may/133537.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=141576985122836\u0026w=2" }, { "trust": 1.1, "url": "http://secunia.com/advisories/57488" }, { "trust": 1.1, "url": "http://secunia.com/advisories/57574" }, { "trust": 1.1, "url": "http://secunia.com/advisories/59313" }, { "trust": 1.1, "url": "http://secunia.com/advisories/59855" }, { "trust": 1.1, "url": "http://www.debian.org/security/2014/dsa-2894" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2014:068" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2015:095" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/66355" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1029925" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91986" }, { "trust": 1.1, "url": "https://support.apple.com/ht205267" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2532" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2653" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1077843" }, { "trust": 0.3, "url": "http://www.openssh.com/txt/release-6.6" }, { "trust": 0.3, "url": "http://www.openssh.com" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021316" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10661\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2016-2881694.html" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04499681" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5097903" }, { "trust": 0.3, "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096510" }, { "trust": 0.3, "url": "http://support.f5.com/kb/en-us/solutions/public/15000/400/sol15430.html?ref=rss" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2532" }, { "trust": 0.2, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.2, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.2, "url": "http://advisories.mageia.org/mgasa-2014-0166.html" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2653" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/264.html" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-alas-2014-369" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2155-1/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=41307" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-2532.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "https://access.redhat.com/solutions/711953" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2014-2653.html" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4478" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0814" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-5107" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201405-06.xml" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4478" }, { "trust": 0.1, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4755" }, { "trust": 0.1, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2532" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-5107" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-5161" }, { "trust": 0.1, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-5161" }, { "trust": 0.1, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-5000" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0814" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-5000" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4755" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0287" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0235" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8146" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0231" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8080" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2331" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7187" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1351" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8090" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9705" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1352" }, { "trust": 0.1, "url": "https://support.apple.com/en-" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-3951" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8147" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0232" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2301" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht205265." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8611" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9427" }, { "trust": 0.1, "url": "http://gpgtools.org" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1855" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-2305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9425" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-7186" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-3618" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9709" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0273" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6277" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9652" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0286" }, { "trust": 0.1, "url": "https://www.tencent.com)" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssh/1:6.2p2-6ubuntu0.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssh/1:5.9p1-5ubuntu1.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssh/1:5.3p1-3ubuntu7.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openssh/1:6.0p1-3ubuntu1.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-1692" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4548" }, { "trust": 0.1, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.1, "url": "https://www.hp.com/go/swa" }, { "trust": 0.1, "url": "http://h20293.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber=" } ], "sources": [ { "db": "VULMON", "id": "CVE-2014-2532" }, { "db": "BID", "id": "66355" }, { "db": "PACKETSTORM", "id": "128654" }, { "db": "PACKETSTORM", "id": "126580" }, { "db": "PACKETSTORM", "id": "133803" }, { "db": "PACKETSTORM", "id": "126075" }, { "db": "PACKETSTORM", "id": "131103" }, { "db": "PACKETSTORM", "id": "126023" }, { "db": "PACKETSTORM", "id": "125859" }, { "db": "PACKETSTORM", "id": "129077" }, { "db": "CNNVD", "id": "CNNVD-201403-336" }, { "db": "NVD", "id": "CVE-2014-2532" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2014-2532" }, { "db": "BID", "id": "66355" }, { "db": "PACKETSTORM", "id": "128654" }, { "db": "PACKETSTORM", "id": "126580" }, { "db": "PACKETSTORM", "id": "133803" }, { "db": "PACKETSTORM", "id": "126075" }, { "db": "PACKETSTORM", "id": "131103" }, { "db": "PACKETSTORM", "id": "126023" }, { "db": "PACKETSTORM", "id": "125859" }, { "db": "PACKETSTORM", "id": "129077" }, { "db": "CNNVD", "id": "CNNVD-201403-336" }, { "db": "NVD", "id": "CVE-2014-2532" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-03-18T00:00:00", "db": "VULMON", "id": "CVE-2014-2532" }, { "date": "2014-03-21T00:00:00", "db": "BID", "id": "66355" }, { "date": "2014-10-14T23:03:32", "db": "PACKETSTORM", "id": "128654" }, { "date": "2014-05-12T18:51:17", "db": "PACKETSTORM", "id": "126580" }, { "date": "2015-10-01T16:33:47", "db": "PACKETSTORM", "id": "133803" }, { "date": "2014-04-09T22:40:33", "db": "PACKETSTORM", "id": "126075" }, { "date": "2015-03-30T21:27:35", "db": "PACKETSTORM", "id": "131103" }, { "date": "2014-04-07T22:02:50", "db": "PACKETSTORM", "id": "126023" }, { "date": "2014-03-25T18:47:40", "db": "PACKETSTORM", "id": "125859" }, { "date": "2014-11-12T18:14:54", "db": "PACKETSTORM", "id": "129077" }, { "date": "2014-03-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201403-336" }, { "date": "2014-03-18T05:18:19", "db": "NVD", "id": "CVE-2014-2532" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-07-19T00:00:00", "db": "VULMON", "id": "CVE-2014-2532" }, { "date": "2016-10-26T01:14:00", "db": "BID", "id": "66355" }, { "date": "2014-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-201403-336" }, { "date": "2018-07-19T01:29:01.077000", "db": "NVD", "id": "CVE-2014-2532" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "128654" }, { "db": "PACKETSTORM", "id": "126580" }, { "db": "PACKETSTORM", "id": "126075" }, { "db": "PACKETSTORM", "id": "131103" }, { "db": "PACKETSTORM", "id": "125859" }, { "db": "CNNVD", "id": "CNNVD-201403-336" } ], "trust": 1.1 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSH Permissions and Access Control Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-201403-336" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201403-336" } ], "trust": 0.6 } }
gsd-2014-2532
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2014-2532", "description": "sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.", "id": "GSD-2014-2532", "references": [ "https://www.suse.com/security/cve/CVE-2014-2532.html", "https://www.debian.org/security/2014/dsa-2894", "https://access.redhat.com/errata/RHSA-2014:1552", "https://advisories.mageia.org/CVE-2014-2532.html", "https://alas.aws.amazon.com/cve/html/CVE-2014-2532.html", "https://linux.oracle.com/cve/CVE-2014-2532.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-2532" ], "details": "sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.", "id": "GSD-2014-2532", "modified": "2023-12-13T01:22:46.628481Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2532", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "59855", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59855" }, { "name": "57574", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57574" }, { "name": "http://advisories.mageia.org/MGASA-2014-0143.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0143.html" }, { "name": "APPLE-SA-2015-09-30-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "name": "HPSBUX03188", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141576985122836\u0026w=2" }, { "name": "SSRT101487", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=141576985122836\u0026w=2" }, { "name": "57488", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57488" }, { "name": "MDVSA-2015:095", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:095" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "59313", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59313" }, { "name": "https://support.apple.com/HT205267", "refsource": "CONFIRM", "url": "https://support.apple.com/HT205267" }, { "name": "FEDORA-2014-6380", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html" }, { "name": "DSA-2894", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2894" }, { "name": "RHSA-2014:1552", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-1552.html" }, { "name": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc", "refsource": "CONFIRM", "url": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc" }, { "name": "1029925", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029925" }, { "name": "[security-announce] 20140315 Announce: OpenSSH 6.6 released", "refsource": "MLIST", "url": "http://marc.info/?l=openbsd-security-announce\u0026m=139492048027313\u0026w=2" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "name": "USN-2155-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2155-1" }, { "name": "FEDORA-2014-6569", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html" }, { "name": "openssh-cve20142532-sec-bypass(91986)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91986" }, { "name": "MDVSA-2014:068", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:068" }, { "name": "66355", "refsource": "BID", "url": "http://www.securityfocus.com/bid/66355" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:communications_user_data_repository:10.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2532" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "[security-announce] 20140315 Announce: OpenSSH 6.6 released", "refsource": "MLIST", "tags": [], "url": "http://marc.info/?l=openbsd-security-announce\u0026m=139492048027313\u0026w=2" }, { "name": "1029925", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1029925" }, { "name": "USN-2155-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2155-1" }, { "name": "57488", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/57488" }, { "name": "57574", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/57574" }, { "name": "66355", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/66355" }, { "name": "DSA-2894", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2014/dsa-2894" }, { "name": "FEDORA-2014-6380", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133537.html" }, { "name": "http://advisories.mageia.org/MGASA-2014-0143.html", "refsource": "CONFIRM", "tags": [], "url": "http://advisories.mageia.org/MGASA-2014-0143.html" }, { "name": "FEDORA-2014-6569", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134026.html" }, { "name": "MDVSA-2014:068", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:068" }, { "name": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc", "refsource": "CONFIRM", "tags": [], "url": "http://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc" }, { "name": "59313", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/59313" }, { "name": "RHSA-2014:1552", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1552.html" }, { "name": "HPSBUX03188", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=141576985122836\u0026w=2" }, { "name": "MDVSA-2015:095", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:095" }, { "name": "https://support.apple.com/HT205267", "refsource": "CONFIRM", "tags": [], "url": "https://support.apple.com/HT205267" }, { "name": "APPLE-SA-2015-09-30-3", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html" }, { "name": "59855", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/59855" }, { "name": "openssh-cve20142532-sec-bypass(91986)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91986" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 2.7 } }, "lastModifiedDate": "2018-07-19T01:29Z", "publishedDate": "2014-03-18T05:18Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.