Action not permitted
Modal body text goes here.
CVE-2008-3844
Vulnerability from cvelistv5
Published
2008-08-27 20:00
Modified
2024-08-07 09:53
Severity ?
EPSS score ?
Summary
Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:53:00.389Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.redhat.com/security/data/openssh-blacklist.html" }, { "name": "ADV-2008-2821", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2821" }, { "name": "31575", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31575" }, { "name": "RHSA-2008:0855", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0855.html" }, { "name": "openssh-rhel-backdoor(44747)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44747" }, { "name": "1020730", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1020730" }, { "name": "30794", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30794" }, { "name": "32241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32241" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-08-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.redhat.com/security/data/openssh-blacklist.html" }, { "name": "ADV-2008-2821", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2821" }, { "name": "31575", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31575" }, { "name": "RHSA-2008:0855", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0855.html" }, { "name": "openssh-rhel-backdoor(44747)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44747" }, { "name": "1020730", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1020730" }, { "name": "30794", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30794" }, { "name": "32241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32241" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3844", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm" }, { "name": "http://www.redhat.com/security/data/openssh-blacklist.html", "refsource": "CONFIRM", "url": "http://www.redhat.com/security/data/openssh-blacklist.html" }, { "name": "ADV-2008-2821", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2821" }, { "name": "31575", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31575" }, { "name": "RHSA-2008:0855", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0855.html" }, { "name": "openssh-rhel-backdoor(44747)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44747" }, { "name": "1020730", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020730" }, { "name": "30794", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30794" }, { "name": "32241", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32241" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3844", "datePublished": "2008-08-27T20:00:00", "dateReserved": "2008-08-27T00:00:00", "dateUpdated": "2024-08-07T09:53:00.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2008-3844\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-08-27T20:41:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.\"},{\"lang\":\"es\",\"value\":\"Ciertos paquetes Red Hat Enterprise Linux (RHEL) 4 y 5 para OpenSSH, como fueron firmados en agosto de 2008 usando una clave Red Hat GPG leg\u00edtima, contienen una modificaci\u00f3n introducida externamente (Trojan Horse) que permite a los autores de los paquetes tener un impacto desconocido. NOTA: como los paquetes maliciosos no fueron distribuidos por ninguna fuente Red Hat oficial, el impacto de este problema est\u00e1 restringido a usuarios que pudieran haber obtenido estos paquetes a trav\u00e9s de puntos de distribuci\u00f3n no oficiales. Como en 20080827, los distribuidores no oficiales de este software son conocidos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.5.z:*:as:*:*:*:*:*\",\"matchCriteriaId\":\"9E17C039-50DC-487F-B800-8694C2E733FA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.5.z:*:es:*:*:*:*:*\",\"matchCriteriaId\":\"B380DA56-B6E4-4735-A66C-EE29B56D7A52\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D8B549B-E57B-4DFE-8A13-CAB06B5356B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D986CAD0-F4E0-4F97-B240-8967CD4466FB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5:*:client:*:*:*:*:*\",\"matchCriteriaId\":\"AF3FB21C-AC0E-4F6C-B68A-9405E57ADCF0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6D7D468-C829-4A4E-8865-E62D8EC5E274\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/31575\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/32241\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://securitytracker.com/id?1020730\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/security/data/openssh-blacklist.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0855.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://www.securityfocus.com/bid/30794\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2821\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/31575\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/32241\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"http://securitytracker.com/id?1020730\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/security/data/openssh-blacklist.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0855.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\"]},{\"url\":\"http://www.securityfocus.com/bid/30794\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2821\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorComment\":\"This alert is primarily for those who may obtain Red Hat binary \\r\\npackages via channels other than those of official Red Hat subscribers. Packages obtained by Red Hat Enterprise Linux subscribers via Red Hat Network are not at risk. \\r\\n\\r\\nRedhat has provided a shell script which lists the affected packages and can verify that none of them are installed on a system at the following location:\\r\\n\\r\\nhttps://www.redhat.com/security/data/openssh-blacklist-1.0.sh\"}}" } }
rhsa-2008_0855
Vulnerability from csaf_redhat
Published
2008-08-22 12:10
Modified
2024-11-05 16:58
Summary
Red Hat Security Advisory: openssh security update
Notes
Topic
Updated openssh packages are now available for Red Hat Enterprise Linux 4,
Red Hat Enterprise Linux 5, and Red Hat Enterprise Linux 4.5 Extended
Update Support.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details
OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation.
Last week Red Hat detected an intrusion on certain of its computer systems
and took immediate action. While the investigation into the intrusion is
on-going, our initial focus was to review and test the distribution
channel we use with our customers, Red Hat Network (RHN) and its associated
security measures. Based on these efforts, we remain highly confident that
our systems and processes prevented the intrusion from compromising RHN or
the content distributed via RHN and accordingly believe that customers who
keep their systems updated using Red Hat Network are not at risk. We are
issuing this alert primarily for those who may obtain Red Hat binary
packages via channels other than those of official Red Hat subscribers.
In connection with the incident, the intruder was able to sign a small
number of OpenSSH packages relating only to Red Hat Enterprise Linux 4
(i386 and x86_64 architectures only) and Red Hat Enterprise Linux 5 (x86_64
architecture only). As a precautionary measure, we are releasing an
updated version of these packages, and have published a list of the
tampered packages and how to detect them at
http://www.redhat.com/security/data/openssh-blacklist.html
To reiterate, our processes and efforts to date indicate that packages
obtained by Red Hat Enterprise Linux subscribers via Red Hat Network are
not at risk.
These packages also fix a low severity flaw in the way ssh handles X11
cookies when creating X11 forwarding connections. When ssh was unable to
create untrusted cookie, ssh used a trusted cookie instead, possibly
allowing the administrative user of a untrusted remote server, or untrusted
application run on the remote server, to gain unintended access to a users
local X server. (CVE-2007-4752)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openssh packages are now available for Red Hat Enterprise Linux 4,\nRed Hat Enterprise Linux 5, and Red Hat Enterprise Linux 4.5 Extended\nUpdate Support.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "OpenSSH is OpenBSD\u0027s SSH (Secure SHell) protocol implementation. \n\nLast week Red Hat detected an intrusion on certain of its computer systems\nand took immediate action. While the investigation into the intrusion is\non-going, our initial focus was to review and test the distribution\nchannel we use with our customers, Red Hat Network (RHN) and its associated\nsecurity measures. Based on these efforts, we remain highly confident that\nour systems and processes prevented the intrusion from compromising RHN or\nthe content distributed via RHN and accordingly believe that customers who\nkeep their systems updated using Red Hat Network are not at risk. We are\nissuing this alert primarily for those who may obtain Red Hat binary\npackages via channels other than those of official Red Hat subscribers.\n\nIn connection with the incident, the intruder was able to sign a small\nnumber of OpenSSH packages relating only to Red Hat Enterprise Linux 4\n(i386 and x86_64 architectures only) and Red Hat Enterprise Linux 5 (x86_64\narchitecture only). As a precautionary measure, we are releasing an\nupdated version of these packages, and have published a list of the\ntampered packages and how to detect them at\nhttp://www.redhat.com/security/data/openssh-blacklist.html\n\nTo reiterate, our processes and efforts to date indicate that packages\nobtained by Red Hat Enterprise Linux subscribers via Red Hat Network are\nnot at risk.\n\nThese packages also fix a low severity flaw in the way ssh handles X11\ncookies when creating X11 forwarding connections. When ssh was unable to\ncreate untrusted cookie, ssh used a trusted cookie instead, possibly\nallowing the administrative user of a untrusted remote server, or untrusted\napplication run on the remote server, to gain unintended access to a users\nlocal X server. (CVE-2007-4752)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0855", "url": "https://access.redhat.com/errata/RHSA-2008:0855" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.redhat.com/security/data/openssh-blacklist.html", "url": "http://www.redhat.com/security/data/openssh-blacklist.html" }, { "category": "external", "summary": "280361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=280361" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0855.json" } ], "title": "Red Hat Security Advisory: openssh security update", "tracking": { "current_release_date": "2024-11-05T16:58:18+00:00", "generator": { "date": "2024-11-05T16:58:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2008:0855", "initial_release_date": "2008-08-22T12:10:00+00:00", "revision_history": [ { "date": "2008-08-22T12:10:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-08-22T08:15:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:58:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS EUS (v. 4.5)", "product": { "name": "Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:4.5::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES EUS (v. 4.5)", "product": { "name": "Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:4.5::es" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:4.3p2-26.el5_2.1.x86_64", "product": { "name": "openssh-server-0:4.3p2-26.el5_2.1.x86_64", "product_id": "openssh-server-0:4.3p2-26.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@4.3p2-26.el5_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "product": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "product_id": "openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@4.3p2-26.el5_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "product": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "product_id": "openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@4.3p2-26.el5_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-0:4.3p2-26.el5_2.1.x86_64", "product": { "name": "openssh-0:4.3p2-26.el5_2.1.x86_64", "product_id": "openssh-0:4.3p2-26.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@4.3p2-26.el5_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "product": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "product_id": "openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@4.3p2-26.el5_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-11.el4_7.x86_64", "product": { "name": "openssh-askpass-0:3.9p1-11.el4_7.x86_64", "product_id": "openssh-askpass-0:3.9p1-11.el4_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-11.el4_7?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-11.el4_7.x86_64", "product": { "name": "openssh-server-0:3.9p1-11.el4_7.x86_64", "product_id": "openssh-server-0:3.9p1-11.el4_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-11.el4_7?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "product": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "product_id": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-11.el4_7?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "product": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "product_id": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-11.el4_7?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-11.el4_7.x86_64", "product": { "name": "openssh-clients-0:3.9p1-11.el4_7.x86_64", "product_id": "openssh-clients-0:3.9p1-11.el4_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-11.el4_7?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-11.el4_7.x86_64", "product": { "name": "openssh-0:3.9p1-11.el4_7.x86_64", "product_id": "openssh-0:3.9p1-11.el4_7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-11.el4_7?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "product": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "product_id": "openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-10.RHEL4.20?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "product": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "product_id": "openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-10.RHEL4.20?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "product": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "product_id": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-10.RHEL4.20?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "product": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "product_id": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-10.RHEL4.20?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-10.RHEL4.20.x86_64", "product": { "name": "openssh-0:3.9p1-10.RHEL4.20.x86_64", "product_id": "openssh-0:3.9p1-10.RHEL4.20.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-10.RHEL4.20?arch=x86_64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "product": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "product_id": "openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-10.RHEL4.20?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:4.3p2-26.el5_2.1.i386", "product": { "name": "openssh-server-0:4.3p2-26.el5_2.1.i386", "product_id": "openssh-server-0:4.3p2-26.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@4.3p2-26.el5_2.1?arch=i386" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "product": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "product_id": "openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@4.3p2-26.el5_2.1?arch=i386" } } }, { "category": "product_version", "name": "openssh-clients-0:4.3p2-26.el5_2.1.i386", "product": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.i386", "product_id": "openssh-clients-0:4.3p2-26.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@4.3p2-26.el5_2.1?arch=i386" } } }, { "category": "product_version", "name": "openssh-0:4.3p2-26.el5_2.1.i386", "product": { "name": "openssh-0:4.3p2-26.el5_2.1.i386", "product_id": "openssh-0:4.3p2-26.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@4.3p2-26.el5_2.1?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-0:4.3p2-26.el5_2.1.i386", "product": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.i386", "product_id": "openssh-askpass-0:4.3p2-26.el5_2.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@4.3p2-26.el5_2.1?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-11.el4_7.i386", "product": { "name": "openssh-askpass-0:3.9p1-11.el4_7.i386", "product_id": "openssh-askpass-0:3.9p1-11.el4_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-11.el4_7?arch=i386" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-11.el4_7.i386", "product": { "name": "openssh-server-0:3.9p1-11.el4_7.i386", "product_id": "openssh-server-0:3.9p1-11.el4_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-11.el4_7?arch=i386" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-11.el4_7.i386", "product": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.i386", "product_id": "openssh-debuginfo-0:3.9p1-11.el4_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-11.el4_7?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "product": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "product_id": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-11.el4_7?arch=i386" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-11.el4_7.i386", "product": { "name": "openssh-clients-0:3.9p1-11.el4_7.i386", "product_id": "openssh-clients-0:3.9p1-11.el4_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-11.el4_7?arch=i386" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-11.el4_7.i386", "product": { "name": "openssh-0:3.9p1-11.el4_7.i386", "product_id": "openssh-0:3.9p1-11.el4_7.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-11.el4_7?arch=i386" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-10.RHEL4.20.i386", "product": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.i386", "product_id": "openssh-clients-0:3.9p1-10.RHEL4.20.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-10.RHEL4.20?arch=i386" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-10.RHEL4.20.i386", "product": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.i386", "product_id": "openssh-server-0:3.9p1-10.RHEL4.20.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-10.RHEL4.20?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "product": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "product_id": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-10.RHEL4.20?arch=i386" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "product": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "product_id": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-10.RHEL4.20?arch=i386" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-10.RHEL4.20.i386", "product": { "name": "openssh-0:3.9p1-10.RHEL4.20.i386", "product_id": "openssh-0:3.9p1-10.RHEL4.20.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-10.RHEL4.20?arch=i386" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "product": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "product_id": "openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-10.RHEL4.20?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "openssh-0:4.3p2-26.el5_2.1.src", "product": { "name": "openssh-0:4.3p2-26.el5_2.1.src", "product_id": "openssh-0:4.3p2-26.el5_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@4.3p2-26.el5_2.1?arch=src" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-11.el4_7.src", "product": { "name": "openssh-0:3.9p1-11.el4_7.src", "product_id": "openssh-0:3.9p1-11.el4_7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-11.el4_7?arch=src" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-10.RHEL4.20.src", "product": { "name": "openssh-0:3.9p1-10.RHEL4.20.src", "product_id": "openssh-0:3.9p1-10.RHEL4.20.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-10.RHEL4.20?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:4.3p2-26.el5_2.1.ia64", "product": { "name": "openssh-server-0:4.3p2-26.el5_2.1.ia64", "product_id": "openssh-server-0:4.3p2-26.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@4.3p2-26.el5_2.1?arch=ia64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "product": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "product_id": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@4.3p2-26.el5_2.1?arch=ia64" } } }, { "category": "product_version", "name": "openssh-clients-0:4.3p2-26.el5_2.1.ia64", "product": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.ia64", "product_id": "openssh-clients-0:4.3p2-26.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@4.3p2-26.el5_2.1?arch=ia64" } } }, { "category": "product_version", "name": "openssh-0:4.3p2-26.el5_2.1.ia64", "product": { "name": "openssh-0:4.3p2-26.el5_2.1.ia64", "product_id": "openssh-0:4.3p2-26.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@4.3p2-26.el5_2.1?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "product": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "product_id": "openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@4.3p2-26.el5_2.1?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-11.el4_7.ia64", "product": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ia64", "product_id": "openssh-askpass-0:3.9p1-11.el4_7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-11.el4_7?arch=ia64" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-11.el4_7.ia64", "product": { "name": "openssh-server-0:3.9p1-11.el4_7.ia64", "product_id": "openssh-server-0:3.9p1-11.el4_7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-11.el4_7?arch=ia64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "product": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "product_id": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-11.el4_7?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "product": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "product_id": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-11.el4_7?arch=ia64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-11.el4_7.ia64", "product": { "name": "openssh-clients-0:3.9p1-11.el4_7.ia64", "product_id": "openssh-clients-0:3.9p1-11.el4_7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-11.el4_7?arch=ia64" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-11.el4_7.ia64", "product": { "name": "openssh-0:3.9p1-11.el4_7.ia64", "product_id": "openssh-0:3.9p1-11.el4_7.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-11.el4_7?arch=ia64" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "product": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "product_id": "openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-10.RHEL4.20?arch=ia64" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-10.RHEL4.20.ia64", "product": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.ia64", "product_id": "openssh-server-0:3.9p1-10.RHEL4.20.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-10.RHEL4.20?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "product": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "product_id": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-10.RHEL4.20?arch=ia64" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "product": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "product_id": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-10.RHEL4.20?arch=ia64" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-10.RHEL4.20.ia64", "product": { "name": "openssh-0:3.9p1-10.RHEL4.20.ia64", "product_id": "openssh-0:3.9p1-10.RHEL4.20.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-10.RHEL4.20?arch=ia64" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "product": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "product_id": "openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-10.RHEL4.20?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:4.3p2-26.el5_2.1.ppc", "product": { "name": "openssh-server-0:4.3p2-26.el5_2.1.ppc", "product_id": "openssh-server-0:4.3p2-26.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@4.3p2-26.el5_2.1?arch=ppc" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "product": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "product_id": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@4.3p2-26.el5_2.1?arch=ppc" } } }, { "category": "product_version", "name": "openssh-clients-0:4.3p2-26.el5_2.1.ppc", "product": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.ppc", "product_id": "openssh-clients-0:4.3p2-26.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@4.3p2-26.el5_2.1?arch=ppc" } } }, { "category": "product_version", "name": "openssh-0:4.3p2-26.el5_2.1.ppc", "product": { "name": "openssh-0:4.3p2-26.el5_2.1.ppc", "product_id": "openssh-0:4.3p2-26.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@4.3p2-26.el5_2.1?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "product": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "product_id": "openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@4.3p2-26.el5_2.1?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-11.el4_7.ppc", "product": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ppc", "product_id": "openssh-askpass-0:3.9p1-11.el4_7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-11.el4_7?arch=ppc" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-11.el4_7.ppc", "product": { "name": "openssh-server-0:3.9p1-11.el4_7.ppc", "product_id": "openssh-server-0:3.9p1-11.el4_7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-11.el4_7?arch=ppc" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "product": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "product_id": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-11.el4_7?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "product": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "product_id": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-11.el4_7?arch=ppc" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-11.el4_7.ppc", "product": { "name": "openssh-clients-0:3.9p1-11.el4_7.ppc", "product_id": "openssh-clients-0:3.9p1-11.el4_7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-11.el4_7?arch=ppc" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-11.el4_7.ppc", "product": { "name": "openssh-0:3.9p1-11.el4_7.ppc", "product_id": "openssh-0:3.9p1-11.el4_7.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-11.el4_7?arch=ppc" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "product": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "product_id": "openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-10.RHEL4.20?arch=ppc" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-10.RHEL4.20.ppc", "product": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.ppc", "product_id": "openssh-server-0:3.9p1-10.RHEL4.20.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-10.RHEL4.20?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "product": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "product_id": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-10.RHEL4.20?arch=ppc" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "product": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "product_id": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-10.RHEL4.20?arch=ppc" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-10.RHEL4.20.ppc", "product": { "name": "openssh-0:3.9p1-10.RHEL4.20.ppc", "product_id": "openssh-0:3.9p1-10.RHEL4.20.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-10.RHEL4.20?arch=ppc" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "product": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "product_id": "openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-10.RHEL4.20?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssh-server-0:4.3p2-26.el5_2.1.s390x", "product": { "name": "openssh-server-0:4.3p2-26.el5_2.1.s390x", "product_id": "openssh-server-0:4.3p2-26.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@4.3p2-26.el5_2.1?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "product": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "product_id": "openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@4.3p2-26.el5_2.1?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:4.3p2-26.el5_2.1.s390x", "product": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.s390x", "product_id": "openssh-clients-0:4.3p2-26.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@4.3p2-26.el5_2.1?arch=s390x" } } }, { "category": "product_version", "name": "openssh-0:4.3p2-26.el5_2.1.s390x", "product": { "name": "openssh-0:4.3p2-26.el5_2.1.s390x", "product_id": "openssh-0:4.3p2-26.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@4.3p2-26.el5_2.1?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "product": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "product_id": "openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@4.3p2-26.el5_2.1?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-11.el4_7.s390x", "product": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390x", "product_id": "openssh-askpass-0:3.9p1-11.el4_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-11.el4_7?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-11.el4_7.s390x", "product": { "name": "openssh-server-0:3.9p1-11.el4_7.s390x", "product_id": "openssh-server-0:3.9p1-11.el4_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-11.el4_7?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "product": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "product_id": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-11.el4_7?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "product": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "product_id": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-11.el4_7?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-11.el4_7.s390x", "product": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390x", "product_id": "openssh-clients-0:3.9p1-11.el4_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-11.el4_7?arch=s390x" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-11.el4_7.s390x", "product": { "name": "openssh-0:3.9p1-11.el4_7.s390x", "product_id": "openssh-0:3.9p1-11.el4_7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-11.el4_7?arch=s390x" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "product": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "product_id": "openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-10.RHEL4.20?arch=s390x" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390x", "product": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390x", "product_id": "openssh-server-0:3.9p1-10.RHEL4.20.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-10.RHEL4.20?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "product": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "product_id": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-10.RHEL4.20?arch=s390x" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "product": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "product_id": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-10.RHEL4.20?arch=s390x" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-10.RHEL4.20.s390x", "product": { "name": "openssh-0:3.9p1-10.RHEL4.20.s390x", "product_id": "openssh-0:3.9p1-10.RHEL4.20.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-10.RHEL4.20?arch=s390x" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "product": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "product_id": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-10.RHEL4.20?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssh-askpass-0:3.9p1-11.el4_7.s390", "product": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390", "product_id": "openssh-askpass-0:3.9p1-11.el4_7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-11.el4_7?arch=s390" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-11.el4_7.s390", "product": { "name": "openssh-server-0:3.9p1-11.el4_7.s390", "product_id": "openssh-server-0:3.9p1-11.el4_7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-11.el4_7?arch=s390" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390", "product": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390", "product_id": "openssh-debuginfo-0:3.9p1-11.el4_7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-11.el4_7?arch=s390" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "product": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "product_id": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-11.el4_7?arch=s390" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-11.el4_7.s390", "product": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390", "product_id": "openssh-clients-0:3.9p1-11.el4_7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-11.el4_7?arch=s390" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-11.el4_7.s390", "product": { "name": "openssh-0:3.9p1-11.el4_7.s390", "product_id": "openssh-0:3.9p1-11.el4_7.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-11.el4_7?arch=s390" } } }, { "category": "product_version", "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390", "product": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390", "product_id": "openssh-clients-0:3.9p1-10.RHEL4.20.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-clients@3.9p1-10.RHEL4.20?arch=s390" } } }, { "category": "product_version", "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390", "product": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390", "product_id": "openssh-server-0:3.9p1-10.RHEL4.20.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-server@3.9p1-10.RHEL4.20?arch=s390" } } }, { "category": "product_version", "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "product": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "product_id": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass-gnome@3.9p1-10.RHEL4.20?arch=s390" } } }, { "category": "product_version", "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "product": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "product_id": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-debuginfo@3.9p1-10.RHEL4.20?arch=s390" } } }, { "category": "product_version", "name": "openssh-0:3.9p1-10.RHEL4.20.s390", "product": { "name": "openssh-0:3.9p1-10.RHEL4.20.s390", "product_id": "openssh-0:3.9p1-10.RHEL4.20.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh@3.9p1-10.RHEL4.20?arch=s390" } } }, { "category": "product_version", "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "product": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "product_id": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssh-askpass@3.9p1-10.RHEL4.20?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.src as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.src", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.5)", "product_id": "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4AS-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-11.el4_7.src" }, "product_reference": "openssh-0:3.9p1-11.el4_7.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-clients-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:openssh-server-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-11.el4_7.src" }, "product_reference": "openssh-0:3.9p1-11.el4_7.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-clients-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:openssh-server-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.src as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.src", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.i386 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.i386", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.ia64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.ppc as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.ppc", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.s390", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.s390x", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-10.RHEL4.20.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.5)", "product_id": "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64" }, "product_reference": "openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "relates_to_product_reference": "4ES-4.5.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-11.el4_7.src" }, "product_reference": "openssh-0:3.9p1-11.el4_7.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-clients-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:openssh-server-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-11.el4_7.src" }, "product_reference": "openssh-0:3.9p1-11.el4_7.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-clients-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-clients-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.i386 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-11.el4_7.i386" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.i386", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-11.el4_7.ia64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.ppc as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-11.el4_7.ppc" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.ppc", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-11.el4_7.s390" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-11.el4_7.s390x" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:3.9p1-11.el4_7.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:openssh-server-0:3.9p1-11.el4_7.x86_64" }, "product_reference": "openssh-server-0:3.9p1-11.el4_7.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-0:4.3p2-26.el5_2.1.src" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-clients-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-clients-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-clients-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-server-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-server-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-server-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-server-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:openssh-server-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-0:4.3p2-26.el5_2.1.src" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-askpass-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-clients-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-clients-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-clients-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-clients-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-server-0:4.3p2-26.el5_2.1.i386" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-server-0:4.3p2-26.el5_2.1.ia64" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-server-0:4.3p2-26.el5_2.1.ppc" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-server-0:4.3p2-26.el5_2.1.s390x" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "openssh-server-0:4.3p2-26.el5_2.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:openssh-server-0:4.3p2-26.el5_2.1.x86_64" }, "product_reference": "openssh-server-0:4.3p2-26.el5_2.1.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-4752", "discovery_date": "2007-09-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "280361" } ], "notes": [ { "category": "description", "text": "ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssh falls back to the trusted x11 cookie if generation of an untrusted cookie fails", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the OpenSSH packages as distributed with Red Hat Enterprise Linux 2.1 or 3, as they do not support Trusted X11 forwarding.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4AS:openssh-0:3.9p1-11.el4_7.i386", "4AS:openssh-0:3.9p1-11.el4_7.ia64", "4AS:openssh-0:3.9p1-11.el4_7.ppc", "4AS:openssh-0:3.9p1-11.el4_7.s390", "4AS:openssh-0:3.9p1-11.el4_7.s390x", "4AS:openssh-0:3.9p1-11.el4_7.src", "4AS:openssh-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-clients-0:3.9p1-11.el4_7.i386", "4AS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4AS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4AS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-server-0:3.9p1-11.el4_7.i386", "4AS:openssh-server-0:3.9p1-11.el4_7.ia64", "4AS:openssh-server-0:3.9p1-11.el4_7.ppc", "4AS:openssh-server-0:3.9p1-11.el4_7.s390", "4AS:openssh-server-0:3.9p1-11.el4_7.s390x", "4AS:openssh-server-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-0:3.9p1-11.el4_7.src", "4Desktop:openssh-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-server-0:3.9p1-11.el4_7.x86_64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4ES:openssh-0:3.9p1-11.el4_7.i386", "4ES:openssh-0:3.9p1-11.el4_7.ia64", "4ES:openssh-0:3.9p1-11.el4_7.ppc", "4ES:openssh-0:3.9p1-11.el4_7.s390", "4ES:openssh-0:3.9p1-11.el4_7.s390x", "4ES:openssh-0:3.9p1-11.el4_7.src", "4ES:openssh-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-clients-0:3.9p1-11.el4_7.i386", "4ES:openssh-clients-0:3.9p1-11.el4_7.ia64", "4ES:openssh-clients-0:3.9p1-11.el4_7.ppc", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390x", "4ES:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-server-0:3.9p1-11.el4_7.i386", "4ES:openssh-server-0:3.9p1-11.el4_7.ia64", "4ES:openssh-server-0:3.9p1-11.el4_7.ppc", "4ES:openssh-server-0:3.9p1-11.el4_7.s390", "4ES:openssh-server-0:3.9p1-11.el4_7.s390x", "4ES:openssh-server-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-0:3.9p1-11.el4_7.i386", "4WS:openssh-0:3.9p1-11.el4_7.ia64", "4WS:openssh-0:3.9p1-11.el4_7.ppc", "4WS:openssh-0:3.9p1-11.el4_7.s390", "4WS:openssh-0:3.9p1-11.el4_7.s390x", "4WS:openssh-0:3.9p1-11.el4_7.src", "4WS:openssh-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-clients-0:3.9p1-11.el4_7.i386", "4WS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4WS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4WS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-server-0:3.9p1-11.el4_7.i386", "4WS:openssh-server-0:3.9p1-11.el4_7.ia64", "4WS:openssh-server-0:3.9p1-11.el4_7.ppc", "4WS:openssh-server-0:3.9p1-11.el4_7.s390", "4WS:openssh-server-0:3.9p1-11.el4_7.s390x", "4WS:openssh-server-0:3.9p1-11.el4_7.x86_64", "5Client:openssh-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-0:4.3p2-26.el5_2.1.src", "5Client:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-server-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-0:4.3p2-26.el5_2.1.src", "5Server:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-server-0:4.3p2-26.el5_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4752" }, { "category": "external", "summary": "RHBZ#280361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=280361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4752", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4752" } ], "release_date": "2007-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-22T12:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4AS:openssh-0:3.9p1-11.el4_7.i386", "4AS:openssh-0:3.9p1-11.el4_7.ia64", "4AS:openssh-0:3.9p1-11.el4_7.ppc", "4AS:openssh-0:3.9p1-11.el4_7.s390", "4AS:openssh-0:3.9p1-11.el4_7.s390x", "4AS:openssh-0:3.9p1-11.el4_7.src", "4AS:openssh-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-clients-0:3.9p1-11.el4_7.i386", "4AS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4AS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4AS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-server-0:3.9p1-11.el4_7.i386", "4AS:openssh-server-0:3.9p1-11.el4_7.ia64", "4AS:openssh-server-0:3.9p1-11.el4_7.ppc", "4AS:openssh-server-0:3.9p1-11.el4_7.s390", "4AS:openssh-server-0:3.9p1-11.el4_7.s390x", "4AS:openssh-server-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-0:3.9p1-11.el4_7.src", "4Desktop:openssh-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-server-0:3.9p1-11.el4_7.x86_64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4ES:openssh-0:3.9p1-11.el4_7.i386", "4ES:openssh-0:3.9p1-11.el4_7.ia64", "4ES:openssh-0:3.9p1-11.el4_7.ppc", "4ES:openssh-0:3.9p1-11.el4_7.s390", "4ES:openssh-0:3.9p1-11.el4_7.s390x", "4ES:openssh-0:3.9p1-11.el4_7.src", "4ES:openssh-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-clients-0:3.9p1-11.el4_7.i386", "4ES:openssh-clients-0:3.9p1-11.el4_7.ia64", "4ES:openssh-clients-0:3.9p1-11.el4_7.ppc", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390x", "4ES:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-server-0:3.9p1-11.el4_7.i386", "4ES:openssh-server-0:3.9p1-11.el4_7.ia64", "4ES:openssh-server-0:3.9p1-11.el4_7.ppc", "4ES:openssh-server-0:3.9p1-11.el4_7.s390", "4ES:openssh-server-0:3.9p1-11.el4_7.s390x", "4ES:openssh-server-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-0:3.9p1-11.el4_7.i386", "4WS:openssh-0:3.9p1-11.el4_7.ia64", "4WS:openssh-0:3.9p1-11.el4_7.ppc", "4WS:openssh-0:3.9p1-11.el4_7.s390", "4WS:openssh-0:3.9p1-11.el4_7.s390x", "4WS:openssh-0:3.9p1-11.el4_7.src", "4WS:openssh-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-clients-0:3.9p1-11.el4_7.i386", "4WS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4WS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4WS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-server-0:3.9p1-11.el4_7.i386", "4WS:openssh-server-0:3.9p1-11.el4_7.ia64", "4WS:openssh-server-0:3.9p1-11.el4_7.ppc", "4WS:openssh-server-0:3.9p1-11.el4_7.s390", "4WS:openssh-server-0:3.9p1-11.el4_7.s390x", "4WS:openssh-server-0:3.9p1-11.el4_7.x86_64", "5Client:openssh-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-0:4.3p2-26.el5_2.1.src", "5Client:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-server-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-0:4.3p2-26.el5_2.1.src", "5Server:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-server-0:4.3p2-26.el5_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0855" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssh falls back to the trusted x11 cookie if generation of an untrusted cookie fails" }, { "cve": "CVE-2008-3844", "discovery_date": "2008-08-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618333" } ], "notes": [ { "category": "description", "text": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4AS:openssh-0:3.9p1-11.el4_7.i386", "4AS:openssh-0:3.9p1-11.el4_7.ia64", "4AS:openssh-0:3.9p1-11.el4_7.ppc", "4AS:openssh-0:3.9p1-11.el4_7.s390", "4AS:openssh-0:3.9p1-11.el4_7.s390x", "4AS:openssh-0:3.9p1-11.el4_7.src", "4AS:openssh-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-clients-0:3.9p1-11.el4_7.i386", "4AS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4AS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4AS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-server-0:3.9p1-11.el4_7.i386", "4AS:openssh-server-0:3.9p1-11.el4_7.ia64", "4AS:openssh-server-0:3.9p1-11.el4_7.ppc", "4AS:openssh-server-0:3.9p1-11.el4_7.s390", "4AS:openssh-server-0:3.9p1-11.el4_7.s390x", "4AS:openssh-server-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-0:3.9p1-11.el4_7.src", "4Desktop:openssh-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-server-0:3.9p1-11.el4_7.x86_64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4ES:openssh-0:3.9p1-11.el4_7.i386", "4ES:openssh-0:3.9p1-11.el4_7.ia64", "4ES:openssh-0:3.9p1-11.el4_7.ppc", "4ES:openssh-0:3.9p1-11.el4_7.s390", "4ES:openssh-0:3.9p1-11.el4_7.s390x", "4ES:openssh-0:3.9p1-11.el4_7.src", "4ES:openssh-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-clients-0:3.9p1-11.el4_7.i386", "4ES:openssh-clients-0:3.9p1-11.el4_7.ia64", "4ES:openssh-clients-0:3.9p1-11.el4_7.ppc", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390x", "4ES:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-server-0:3.9p1-11.el4_7.i386", "4ES:openssh-server-0:3.9p1-11.el4_7.ia64", "4ES:openssh-server-0:3.9p1-11.el4_7.ppc", "4ES:openssh-server-0:3.9p1-11.el4_7.s390", "4ES:openssh-server-0:3.9p1-11.el4_7.s390x", "4ES:openssh-server-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-0:3.9p1-11.el4_7.i386", "4WS:openssh-0:3.9p1-11.el4_7.ia64", "4WS:openssh-0:3.9p1-11.el4_7.ppc", "4WS:openssh-0:3.9p1-11.el4_7.s390", "4WS:openssh-0:3.9p1-11.el4_7.s390x", "4WS:openssh-0:3.9p1-11.el4_7.src", "4WS:openssh-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-clients-0:3.9p1-11.el4_7.i386", "4WS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4WS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4WS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-server-0:3.9p1-11.el4_7.i386", "4WS:openssh-server-0:3.9p1-11.el4_7.ia64", "4WS:openssh-server-0:3.9p1-11.el4_7.ppc", "4WS:openssh-server-0:3.9p1-11.el4_7.s390", "4WS:openssh-server-0:3.9p1-11.el4_7.s390x", "4WS:openssh-server-0:3.9p1-11.el4_7.x86_64", "5Client:openssh-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-0:4.3p2-26.el5_2.1.src", "5Client:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-server-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-0:4.3p2-26.el5_2.1.src", "5Server:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-server-0:4.3p2-26.el5_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-3844" }, { "category": "external", "summary": "RHBZ#1618333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-3844", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3844" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3844", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3844" } ], "release_date": "2008-08-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-08-22T12:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4AS-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4AS-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4AS:openssh-0:3.9p1-11.el4_7.i386", "4AS:openssh-0:3.9p1-11.el4_7.ia64", "4AS:openssh-0:3.9p1-11.el4_7.ppc", "4AS:openssh-0:3.9p1-11.el4_7.s390", "4AS:openssh-0:3.9p1-11.el4_7.s390x", "4AS:openssh-0:3.9p1-11.el4_7.src", "4AS:openssh-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4AS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-clients-0:3.9p1-11.el4_7.i386", "4AS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4AS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390", "4AS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4AS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4AS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4AS:openssh-server-0:3.9p1-11.el4_7.i386", "4AS:openssh-server-0:3.9p1-11.el4_7.ia64", "4AS:openssh-server-0:3.9p1-11.el4_7.ppc", "4AS:openssh-server-0:3.9p1-11.el4_7.s390", "4AS:openssh-server-0:3.9p1-11.el4_7.s390x", "4AS:openssh-server-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-0:3.9p1-11.el4_7.src", "4Desktop:openssh-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.i386", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ia64", "4Desktop:openssh-server-0:3.9p1-11.el4_7.ppc", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390", "4Desktop:openssh-server-0:3.9p1-11.el4_7.s390x", "4Desktop:openssh-server-0:3.9p1-11.el4_7.x86_64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.src", "4ES-4.5.z:openssh-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-askpass-gnome-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-clients-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-debuginfo-0:3.9p1-10.RHEL4.20.x86_64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.i386", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ia64", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.ppc", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.s390x", "4ES-4.5.z:openssh-server-0:3.9p1-10.RHEL4.20.x86_64", "4ES:openssh-0:3.9p1-11.el4_7.i386", "4ES:openssh-0:3.9p1-11.el4_7.ia64", "4ES:openssh-0:3.9p1-11.el4_7.ppc", "4ES:openssh-0:3.9p1-11.el4_7.s390", "4ES:openssh-0:3.9p1-11.el4_7.s390x", "4ES:openssh-0:3.9p1-11.el4_7.src", "4ES:openssh-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4ES:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-clients-0:3.9p1-11.el4_7.i386", "4ES:openssh-clients-0:3.9p1-11.el4_7.ia64", "4ES:openssh-clients-0:3.9p1-11.el4_7.ppc", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390", "4ES:openssh-clients-0:3.9p1-11.el4_7.s390x", "4ES:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4ES:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4ES:openssh-server-0:3.9p1-11.el4_7.i386", "4ES:openssh-server-0:3.9p1-11.el4_7.ia64", "4ES:openssh-server-0:3.9p1-11.el4_7.ppc", "4ES:openssh-server-0:3.9p1-11.el4_7.s390", "4ES:openssh-server-0:3.9p1-11.el4_7.s390x", "4ES:openssh-server-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-0:3.9p1-11.el4_7.i386", "4WS:openssh-0:3.9p1-11.el4_7.ia64", "4WS:openssh-0:3.9p1-11.el4_7.ppc", "4WS:openssh-0:3.9p1-11.el4_7.s390", "4WS:openssh-0:3.9p1-11.el4_7.s390x", "4WS:openssh-0:3.9p1-11.el4_7.src", "4WS:openssh-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.i386", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ia64", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.ppc", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.s390x", "4WS:openssh-askpass-gnome-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-clients-0:3.9p1-11.el4_7.i386", "4WS:openssh-clients-0:3.9p1-11.el4_7.ia64", "4WS:openssh-clients-0:3.9p1-11.el4_7.ppc", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390", "4WS:openssh-clients-0:3.9p1-11.el4_7.s390x", "4WS:openssh-clients-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.i386", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ia64", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.ppc", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.s390x", "4WS:openssh-debuginfo-0:3.9p1-11.el4_7.x86_64", "4WS:openssh-server-0:3.9p1-11.el4_7.i386", "4WS:openssh-server-0:3.9p1-11.el4_7.ia64", "4WS:openssh-server-0:3.9p1-11.el4_7.ppc", "4WS:openssh-server-0:3.9p1-11.el4_7.s390", "4WS:openssh-server-0:3.9p1-11.el4_7.s390x", "4WS:openssh-server-0:3.9p1-11.el4_7.x86_64", "5Client:openssh-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-0:4.3p2-26.el5_2.1.src", "5Client:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Client:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Client:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Client:openssh-server-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-0:4.3p2-26.el5_2.1.src", "5Server:openssh-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-askpass-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-clients-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-debuginfo-0:4.3p2-26.el5_2.1.x86_64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.i386", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ia64", "5Server:openssh-server-0:4.3p2-26.el5_2.1.ppc", "5Server:openssh-server-0:4.3p2-26.el5_2.1.s390x", "5Server:openssh-server-0:4.3p2-26.el5_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0855" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
gsd-2008-3844
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2008-3844", "description": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.", "id": "GSD-2008-3844", "references": [ "https://access.redhat.com/errata/RHSA-2008:0855", "https://linux.oracle.com/cve/CVE-2008-3844.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2008-3844" ], "details": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.", "id": "GSD-2008-3844", "modified": "2023-12-13T01:23:05.750194Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3844", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm" }, { "name": "http://www.redhat.com/security/data/openssh-blacklist.html", "refsource": "CONFIRM", "url": "http://www.redhat.com/security/data/openssh-blacklist.html" }, { "name": "ADV-2008-2821", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2821" }, { "name": "31575", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31575" }, { "name": "RHSA-2008:0855", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0855.html" }, { "name": "openssh-rhel-backdoor(44747)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44747" }, { "name": "1020730", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1020730" }, { "name": "30794", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30794" }, { "name": "32241", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32241" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.5.z:*:es:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:4.5.z:*:as:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5:*:client:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3844" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.redhat.com/security/data/openssh-blacklist.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/security/data/openssh-blacklist.html" }, { "name": "RHSA-2008:0855", "refsource": "REDHAT", "tags": [ "Not Applicable" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0855.html" }, { "name": "30794", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/30794" }, { "name": "1020730", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1020730" }, { "name": "31575", "refsource": "SECUNIA", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://secunia.com/advisories/31575" }, { "name": "32241", "refsource": "SECUNIA", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://secunia.com/advisories/32241" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm" }, { "name": "ADV-2008-2821", "refsource": "VUPEN", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2008/2821" }, { "name": "openssh-rhel-backdoor(44747)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44747" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": true } }, "lastModifiedDate": "2017-08-08T01:32Z", "publishedDate": "2008-08-27T20:41Z" } } }
ghsa-mmff-h39g-hgff
Vulnerability from github
Published
2022-05-02 00:04
Modified
2022-05-02 00:04
Details
Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
{ "affected": [], "aliases": [ "CVE-2008-3844" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-08-27T20:41:00Z", "severity": "HIGH" }, "details": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.", "id": "GHSA-mmff-h39g-hgff", "modified": "2022-05-02T00:04:14Z", "published": "2022-05-02T00:04:14Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3844" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44747" }, { "type": "WEB", "url": "http://secunia.com/advisories/31575" }, { "type": "WEB", "url": "http://secunia.com/advisories/32241" }, { "type": "WEB", "url": "http://securitytracker.com/id?1020730" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm" }, { "type": "WEB", "url": "http://www.redhat.com/security/data/openssh-blacklist.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0855.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/30794" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/2821" } ], "schema_version": "1.4.0", "severity": [] }
sca-2025-0009
Vulnerability from csaf_sick
Published
2025-08-01 13:00
Modified
2025-08-01 13:00
Summary
Vulnerabilities affecting SICK TDC-E210GC
Notes
summary
SICK has identified multiple vulnerabilities in the SICK TDC-E210GC product. The advisory includes a total of 23 vulnerabilities, of which 14 are confirmed as affected and 9 as known not affected. At this time, SICK is not aware of any public exploits specifically targeting these vulnerabilities. Customers are strongly advised to apply the recommended workaround for the affected vulnerabilities to reduce potential risk.
General Security Measures
As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.
Vulnerability Classification
SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer’s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en-US", "notes": [ { "category": "summary", "text": "SICK has identified multiple vulnerabilities in the SICK TDC-E210GC product. The advisory includes a total of 23 vulnerabilities, of which 14 are confirmed as affected and 9 as known not affected. At this time, SICK is not aware of any public exploits specifically targeting these vulnerabilities. Customers are strongly advised to apply the recommended workaround for the affected vulnerabilities to reduce potential risk.", "title": "summary" }, { "category": "general", "text": "As general security measures, SICK recommends to minimize network exposure of the devices, restrict network access and follow recommended security practices in order to run the devices in a protected IT environment.", "title": "General Security Measures" }, { "category": "general", "text": "SICK performs vulnerability classification by using the CVSS scoring system (*CVSS v3.1*). The environmental score is dependent on the customer\u2019s environment and can affect the overall CVSS score. SICK recommends that customers individually evaluate the environmental score to achieve final scoring.", "title": "Vulnerability Classification" } ], "publisher": { "category": "vendor", "contact_details": "psirt@sick.de", "issuing_authority": "SICK PSIRT is responsible for any vulnerabilities related to SICK products.", "name": "SICK PSIRT", "namespace": "https://www.sick.com/psirt" }, "references": [ { "summary": "SICK PSIRT Security Advisories", "url": "https://sick.com/psirt" }, { "summary": "SICK Operating Guidelines", "url": "https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf" }, { "summary": "ICS-CERT recommended practices on Industrial Security", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "summary": "CVSS v3.1 Calculator", "url": "https://www.first.org/cvss/calculator/3.1" }, { "category": "self", "summary": "The canonical URL.", "url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0009.json" } ], "title": "Vulnerabilities affecting SICK TDC-E210GC", "tracking": { "current_release_date": "2025-08-01T13:00:00.000Z", "generator": { "date": "2025-08-01T08:14:37.621Z", "engine": { "name": "Secvisogram", "version": "2.5.32" } }, "id": "SCA-2025-0009", "initial_release_date": "2025-08-01T13:00:00.000Z", "revision_history": [ { "date": "2025-08-01T13:00:00.000Z", "number": "1", "summary": "Initial version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SICK TDC-E210GC all versions", "product_id": "CSAFPID-0001", "product_identification_helper": { "skus": [ "6070344" ] } } } ], "category": "product_name", "name": "TDC-E210GC" } ], "category": "product_family", "name": "Telematic Data Collector" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SICK TDC-E210GC Firmware all versions", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "TDC-E210GC Firmware" } ], "category": "vendor", "name": "SICK AG" } ], "relationships": [ { "category": "installed_on", "full_product_name": { "name": "SICK TDC-E210GC all Firmware versions", "product_id": "CSAFPID-0003" }, "product_reference": "CSAFPID-0002", "relates_to_product_reference": "CSAFPID-0001" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-38408", "cwe": { "id": "CWE-428", "name": "Unquoted Search Path or Element" }, "notes": [ { "category": "summary", "text": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "environmentalScore": 9.8, "environmentalSeverity": "CRITICAL", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 9.8, "temporalSeverity": "CRITICAL", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Remote Code Execution Due to an Inssufficiently Trustworthy Search Path" }, { "cve": "CVE-2021-23017", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "notes": [ { "category": "summary", "text": "A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.7, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.7, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "NGINX Off-by-One Error" }, { "cve": "CVE-2020-12062", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client\u0027s download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that \"this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol\" and \"utimes does not fail under normal circumstances.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Inproper Input Validation in OpenSSH 8.2" }, { "cve": "CVE-2021-41874", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An unauthorized access vulnerabiitly exists in all versions of Portainer, which could let a malicious user obtain sensitive information. NOTE: Portainer has received no detail of this CVE report. There is also no response after multiple attempts of contacting the original source.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Unauthorized Access Vulnerabiitly in All Versions of Portainer" }, { "cve": "CVE-2021-25217", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "In ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16, ISC DHCP 4.4.0 -\u003e 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the component being affected (i.e., dhclient or dhcpd) whether the package was built as a 32-bit or 64-bit binary whether the compiler flag -fstack-protection-strong was used when compiling In dhclient, ISC has not successfully reproduced the error on a 64-bit system. However, on a 32-bit system it is possible to cause dhclient to crash when reading an improper lease, which could cause network connectivity problems for an affected system due to the absence of a running DHCP client process. In dhcpd, when run in DHCPv4 or DHCPv6 mode: if the dhcpd server binary was built for a 32-bit architecture AND the -fstack-protection-strong flag was specified to the compiler, dhcpd may exit while parsing a lease file containing an objectionable lease, resulting in lack of service to clients. Additionally, the offending lease and the lease immediately following it in the lease database may be improperly deleted. if the dhcpd server binary was built for a 64-bit architecture OR if the -fstack-protection-strong compiler flag was NOT specified, the crash will not occur, but it is possible for the offending lease and the lease which immediately followed it to be improperly deleted.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.4, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "temporalScore": 7.4, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "A Buffer Overrun in Lease File Parsing Code Can Be Used to Exploit a Common Vulnerability Shared by DHCPD and Dhclient" }, { "cve": "CVE-2021-3618", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim\u0027s traffic at the TCP/IP layer can redirect traffic from one subdomainto another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.4, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.4, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Broken Authentication of TLS" }, { "cve": "CVE-2021-28041", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "SSH-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.1, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "temporalScore": 7.1, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Double Free in OpenSSH" }, { "cve": "CVE-2020-15778", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.8, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.8, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Command Injection in the OpenSSH scp.c to Remote Function" }, { "cve": "CVE-2021-42650", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "Cross Site Scripting (XSS) vulnerability exists in Portainer before 2.9.1 via the node input box in Custom Templates.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "environmentalScore": 6.1, "environmentalSeverity": "MEDIUM", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "temporalScore": 6.1, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Portainer XSS Vulnerability" }, { "cve": "CVE-2016-20012", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "environmentalScore": 5.3, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.3, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH User Enumeration" }, { "cve": "CVE-2025-26465", "cwe": { "id": "CWE-390", "name": "Detection of Error Condition Without Action" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "environmentalScore": 6.8, "environmentalSeverity": "MEDIUM", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 6.8, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH VerifyHostKeyDNS Vulnerable to Mashine-in-the-Middle" }, { "cve": "CVE-2019-20372", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "environmentalScore": 5.3, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.3, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "NGINX Allows HTTP Request Smuggling" }, { "cve": "CVE-2020-14145", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk.\nThe collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "environmentalScore": 5.9, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.9, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Information Leak in the Algorithm Negotiation" }, { "cve": "CVE-2021-36368", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user\u0027s behalf. NOTE: the vendor\u0027s position is \"this is not an authentication bypass, since nothing is being bypassed.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0003" ] }, "remediations": [ { "category": "workaround", "details": "Please make sure that only trusted entities have access to the device. Furthermore, you should apply the following General Security Measures when operating the product to mitigate the associated security risk. The collected resources \"SICK Operating Guidelines\" and \"ICS-CERT recommended practices on Industrial Security\" could help to implement the general security practices.", "product_ids": [ "CSAFPID-0003" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "environmentalScore": 6.8, "environmentalSeverity": "MEDIUM", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 6.8, "temporalSeverity": "MEDIUM", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Vulnerable to Authentication Bypass" }, { "cve": "CVE-2022-24961", "cwe": { "id": "CWE-390", "name": "Detection of Error Condition Without Action" }, "notes": [ { "category": "summary", "text": "In Portainer Agent before 2.11.1, an API server can continue running even if not associated with a Portainer instance in the past few days. The vulnerability allows the API server to run even when not linked to a Portainer instance recently, posing a security risk.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "environmentalScore": 9.8, "environmentalSeverity": "CRITICAL", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 9.8, "temporalSeverity": "CRITICAL", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Portainer Agent API Server Vulnerability" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Denial of Service in HTTP/2 Protocol" }, { "cve": "CVE-2021-41617", "cwe": { "id": "CWE-273", "name": "Improper Check for Dropped Privileges" }, "notes": [ { "category": "summary", "text": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "temporalScore": 7, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Privilege Escalation" }, { "cve": "CVE-2023-51767", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "temporalScore": 7, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Authentication Bypass Vulnerability" }, { "cve": "CVE-2008-3844", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "environmentalScore": 7.5, "environmentalSeverity": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 7.5, "temporalSeverity": "HIGH", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "Trojan Horse at RHEL4 for OpenSSH" }, { "cve": "CVE-2022-2929", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "In ISC DHCP 1.0 -\u003e 4.4.3, ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16-P1 a system with access to a DHCP server, sending DHCP packets crafted to include fqdn labels longer than 63 bytes, could eventually cause the server to run out of memory.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 6.5, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 6.5, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "DHCP Memory Leak" }, { "cve": "CVE-2022-2928", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In ISC DHCP 4.4.0 -\u003e 4.4.3, ISC DHCP 4.1-ESV-R1 -\u003e 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option\u0027s refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 6.5, "environmentalSeverity": "MEDIUM", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 6.5, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "An Option Refcount Overflow Exists in DHCPD" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "environmentalScore": 5.9, "environmentalSeverity": "MEDIUM", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 5.9, "temporalSeverity": "MEDIUM", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH Vulnerable for Bypassing Integrity Checks" }, { "cve": "CVE-2007-2768", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.", "title": "Summary" } ], "product_status": { "known_not_affected": [ "CSAFPID-0003" ] }, "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "environmentalScore": 3.7, "environmentalSeverity": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "temporalScore": 3.7, "temporalSeverity": "LOW", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0003" ] } ], "title": "OpenSSH User Enumeration Using OPIE" } ] }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.