Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2012:0884 - Security Advisory
Issued:
2012-06-20
Updated:
2012-06-20

RHSA-2012:0884 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: openssh security, bug fix, and enhancement update

Type/Severity

Security Advisory: Low

Topic

Updated openssh packages that fix one security issue, several bugs, and add
various enhancements are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

OpenSSH is OpenBSD's Secure Shell (SSH) protocol implementation. These
packages include the core files necessary for the OpenSSH client and
server.

A denial of service flaw was found in the OpenSSH GSSAPI authentication
implementation. A remote, authenticated user could use this flaw to make
the OpenSSH server daemon (sshd) use an excessive amount of memory, leading
to a denial of service. GSSAPI authentication is enabled by default
("GSSAPIAuthentication yes" in "/etc/ssh/sshd_config"). (CVE-2011-5000)

These updated openssh packages also provide fixes for the following bugs:

  • SSH X11 forwarding failed if IPv6 was enabled and the parameter
    X11UseLocalhost was set to "no". Consequently, users could not set X
    forwarding. This update fixes sshd and ssh to correctly bind the port for
    the IPv6 protocol. As a result, X11 forwarding now works as expected with
    IPv6. (BZ#732955)
  • The sshd daemon was killed by the OOM killer when running a stress test.
    Consequently, a user could not log in. With this update, the sshd daemon
    sets its oom_adj value to -17. As a result, sshd is not chosen by OOM
    killer and users are able to log in to solve problems with memory.
    (BZ#744236)
  • If the SSH server is configured with a banner that contains a backslash
    character, then the client will escape it with another "\" character, so it
    prints double backslashes. An upstream patch has been applied to correct
    the problem and the SSH banner is now correctly displayed. (BZ#809619)

In addition, these updated openssh packages provide the following
enhancements:

  • Previously, SSH allowed multiple ways of authentication of which only one
    was required for a successful login. SSH can now be set up to require
    multiple ways of authentication. For example, logging in to an SSH-enabled
    machine requires both a passphrase and a public key to be entered. The
    RequiredAuthentications1 and RequiredAuthentications2 options can be
    configured in the /etc/ssh/sshd_config file to specify authentications that
    are required for a successful login. For example, to set key and password
    authentication for SSH version 2, type:

echo "RequiredAuthentications2 publickey,password" >> /etc/ssh/sshd_config

For more information on the aforementioned /etc/ssh/sshd_config options,
refer to the sshd_config man page. (BZ#657378)

  • Previously, OpenSSH could use the Advanced Encryption Standard New
    Instructions (AES-NI) instruction set only with the AES Cipher-block
    chaining (CBC) cipher. This update adds support for Counter (CTR) mode
    encryption in OpenSSH so the AES-NI instruction set can now be used
    efficiently also with the AES CTR cipher. (BZ#756929)
  • Prior to this update, an unprivileged slave sshd process was run as
    the sshd_t context during privilege separation (privsep). sshd_t is the
    SELinux context used for running the sshd daemon. Given that the
    unprivileged slave process is run under the user's UID, it is fitting to
    run this process under the user's SELinux context instead of the privileged
    sshd_t context. With this update, the unprivileged slave process is now run
    as the user's context instead of the sshd_t context in accordance with the
    principle of privilege separation. The unprivileged process, which might be
    potentially more sensitive to security threats, is now run under the user's
    SELinux context. (BZ#798241)

Users are advised to upgrade to these updated openssh packages, which
contain backported patches to resolve these issues and add these
enhancements. After installing this update, the OpenSSH server daemon
(sshd) will be restarted automatically.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386

Fixes

  • BZ - 657378 - [RFE] ability to require password and public-key for login
  • BZ - 732955 - X11 forwarding fails, if IPv6 is enabled and X11UseLocalhost=no
  • BZ - 797384 - Init scripts tries to read missing file
  • BZ - 809938 - CVE-2011-5000 openssh: post-authentication resource exhaustion bug via GSSAPI

CVEs

  • CVE-2011-5000

References

  • https://access.redhat.com/security/updates/classification/#low
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
openssh-5.3p1-81.el6.src.rpm SHA-256: f50583ceaf29d3cafc4c6f52adc43fb75c0aa9d81c7a730a632df1238c27d88b
x86_64
openssh-5.3p1-81.el6.x86_64.rpm SHA-256: 7a4694ec8cad3ed4ddb8cf6ca04202583757c95f978deb06822c4f5b55be375b
openssh-askpass-5.3p1-81.el6.x86_64.rpm SHA-256: e84b7b795f9795f32ded187aae1840456120b843602b2cef9292f8ce346c2466
openssh-clients-5.3p1-81.el6.x86_64.rpm SHA-256: 7e9fdef71f30b0e50fca1a7f22c082c8e0c02cfa1ee6d9b9945c542d8f595635
openssh-debuginfo-5.3p1-81.el6.i686.rpm SHA-256: a7fe5756b24e1f4c779d10044b518d1673b9b1db61f1bbae775321f0860b1534
openssh-debuginfo-5.3p1-81.el6.x86_64.rpm SHA-256: 156f5db9af87ef9a2cfd742c5d7af79efd8ccca9671da97ca4c66aa1acbffe7a
openssh-debuginfo-5.3p1-81.el6.x86_64.rpm SHA-256: 156f5db9af87ef9a2cfd742c5d7af79efd8ccca9671da97ca4c66aa1acbffe7a
openssh-ldap-5.3p1-81.el6.x86_64.rpm SHA-256: 5a11eccf578745e58d4ee1d7358afb4666213d80f48ca8abf749b4625daf9427
openssh-server-5.3p1-81.el6.x86_64.rpm SHA-256: c2d139ee0565a0f55d3951ab7f7cbaa7b97db8143f9f79c6cf4a9b4a5e56f900
pam_ssh_agent_auth-0.9-81.el6.i686.rpm SHA-256: 1624e3e978e712ff93d90d3c7b0e986ab000c898d95337923078fe785b86e3b2
pam_ssh_agent_auth-0.9-81.el6.x86_64.rpm SHA-256: 0d3eae91db9f4d0fc225a2dd85e7d4fcf0eeea535297de16fea59d757baedf33
i386
openssh-5.3p1-81.el6.i686.rpm SHA-256: 00364fae94375c8d61767258e9d0ede09ffbd35726a361e8f31240c234662908
openssh-askpass-5.3p1-81.el6.i686.rpm SHA-256: 2ff4d91f02efe9ef0cfe8fc9535211b16c85ce038d964b254a2dadf186260d03
openssh-clients-5.3p1-81.el6.i686.rpm SHA-256: c94f4292cefd5e7efef7de3c47a215bd3197d2e828991a7d050e229e6f7f8a74
openssh-debuginfo-5.3p1-81.el6.i686.rpm SHA-256: a7fe5756b24e1f4c779d10044b518d1673b9b1db61f1bbae775321f0860b1534
openssh-debuginfo-5.3p1-81.el6.i686.rpm SHA-256: a7fe5756b24e1f4c779d10044b518d1673b9b1db61f1bbae775321f0860b1534
openssh-ldap-5.3p1-81.el6.i686.rpm SHA-256: dba91daf80d3b5b810223bbc28a671616f08d7f58d850c472b31e3d5889fbbed
openssh-server-5.3p1-81.el6.i686.rpm SHA-256: 9e7db5f6b67967fac88fe4bd00a942aa3a7ede4609afb8d1f169d779cf7271ca
pam_ssh_agent_auth-0.9-81.el6.i686.rpm SHA-256: 1624e3e978e712ff93d90d3c7b0e986ab000c898d95337923078fe785b86e3b2

Red Hat Enterprise Linux Workstation 6

SRPM
openssh-5.3p1-81.el6.src.rpm SHA-256: f50583ceaf29d3cafc4c6f52adc43fb75c0aa9d81c7a730a632df1238c27d88b
x86_64
openssh-5.3p1-81.el6.x86_64.rpm SHA-256: 7a4694ec8cad3ed4ddb8cf6ca04202583757c95f978deb06822c4f5b55be375b
openssh-askpass-5.3p1-81.el6.x86_64.rpm SHA-256: e84b7b795f9795f32ded187aae1840456120b843602b2cef9292f8ce346c2466
openssh-clients-5.3p1-81.el6.x86_64.rpm SHA-256: 7e9fdef71f30b0e50fca1a7f22c082c8e0c02cfa1ee6d9b9945c542d8f595635
openssh-debuginfo-5.3p1-81.el6.i686.rpm SHA-256: a7fe5756b24e1f4c779d10044b518d1673b9b1db61f1bbae775321f0860b1534
openssh-debuginfo-5.3p1-81.el6.x86_64.rpm SHA-256: 156f5db9af87ef9a2cfd742c5d7af79efd8ccca9671da97ca4c66aa1acbffe7a
openssh-debuginfo-5.3p1-81.el6.x86_64.rpm SHA-256: 156f5db9af87ef9a2cfd742c5d7af79efd8ccca9671da97ca4c66aa1acbffe7a
openssh-ldap-5.3p1-81.el6.x86_64.rpm SHA-256: 5a11eccf578745e58d4ee1d7358afb4666213d80f48ca8abf749b4625daf9427
openssh-server-5.3p1-81.el6.x86_64.rpm SHA-256: c2d139ee0565a0f55d3951ab7f7cbaa7b97db8143f9f79c6cf4a9b4a5e56f900
pam_ssh_agent_auth-0.9-81.el6.i686.rpm SHA-256: 1624e3e978e712ff93d90d3c7b0e986ab000c898d95337923078fe785b86e3b2
pam_ssh_agent_auth-0.9-81.el6.x86_64.rpm SHA-256: 0d3eae91db9f4d0fc225a2dd85e7d4fcf0eeea535297de16fea59d757baedf33
i386
openssh-5.3p1-81.el6.i686.rpm SHA-256: 00364fae94375c8d61767258e9d0ede09ffbd35726a361e8f31240c234662908
openssh-askpass-5.3p1-81.el6.i686.rpm SHA-256: 2ff4d91f02efe9ef0cfe8fc9535211b16c85ce038d964b254a2dadf186260d03
openssh-clients-5.3p1-81.el6.i686.rpm SHA-256: c94f4292cefd5e7efef7de3c47a215bd3197d2e828991a7d050e229e6f7f8a74
openssh-debuginfo-5.3p1-81.el6.i686.rpm SHA-256: a7fe5756b24e1f4c779d10044b518d1673b9b1db61f1bbae775321f0860b1534
openssh-debuginfo-5.3p1-81.el6.i686.rpm SHA-256: a7fe5756b24e1f4c779d10044b518d1673b9b1db61f1bbae775321f0860b1534
openssh-ldap-5.3p1-81.el6.i686.rpm SHA-256: dba91daf80d3b5b810223bbc28a671616f08d7f58d850c472b31e3d5889fbbed
openssh-server-5.3p1-81.el6.i686.rpm SHA-256: 9e7db5f6b67967fac88fe4bd00a942aa3a7ede4609afb8d1f169d779cf7271ca
pam_ssh_agent_auth-0.9-81.el6.i686.rpm SHA-256: 1624e3e978e712ff93d90d3c7b0e986ab000c898d95337923078fe785b86e3b2

Red Hat Enterprise Linux Desktop 6

SRPM
openssh-5.3p1-81.el6.src.rpm SHA-256: f50583ceaf29d3cafc4c6f52adc43fb75c0aa9d81c7a730a632df1238c27d88b
x86_64
openssh-5.3p1-81.el6.x86_64.rpm SHA-256: 7a4694ec8cad3ed4ddb8cf6ca04202583757c95f978deb06822c4f5b55be375b
openssh-askpass-5.3p1-81.el6.x86_64.rpm SHA-256: e84b7b795f9795f32ded187aae1840456120b843602b2cef9292f8ce346c2466
openssh-clients-5.3p1-81.el6.x86_64.rpm SHA-256: 7e9fdef71f30b0e50fca1a7f22c082c8e0c02cfa1ee6d9b9945c542d8f595635
openssh-debuginfo-5.3p1-81.el6.i686.rpm SHA-256: a7fe5756b24e1f4c779d10044b518d1673b9b1db61f1bbae775321f0860b1534
openssh-debuginfo-5.3p1-81.el6.x86_64.rpm SHA-256: 156f5db9af87ef9a2cfd742c5d7af79efd8ccca9671da97ca4c66aa1acbffe7a
openssh-debuginfo-5.3p1-81.el6.x86_64.rpm SHA-256: 156f5db9af87ef9a2cfd742c5d7af79efd8ccca9671da97ca4c66aa1acbffe7a
openssh-ldap-5.3p1-81.el6.x86_64.rpm SHA-256: 5a11eccf578745e58d4ee1d7358afb4666213d80f48ca8abf749b4625daf9427
openssh-server-5.3p1-81.el6.x86_64.rpm SHA-256: c2d139ee0565a0f55d3951ab7f7cbaa7b97db8143f9f79c6cf4a9b4a5e56f900
pam_ssh_agent_auth-0.9-81.el6.i686.rpm SHA-256: 1624e3e978e712ff93d90d3c7b0e986ab000c898d95337923078fe785b86e3b2
pam_ssh_agent_auth-0.9-81.el6.x86_64.rpm SHA-256: 0d3eae91db9f4d0fc225a2dd85e7d4fcf0eeea535297de16fea59d757baedf33
i386
openssh-5.3p1-81.el6.i686.rpm SHA-256: 00364fae94375c8d61767258e9d0ede09ffbd35726a361e8f31240c234662908
openssh-askpass-5.3p1-81.el6.i686.rpm SHA-256: 2ff4d91f02efe9ef0cfe8fc9535211b16c85ce038d964b254a2dadf186260d03
openssh-clients-5.3p1-81.el6.i686.rpm SHA-256: c94f4292cefd5e7efef7de3c47a215bd3197d2e828991a7d050e229e6f7f8a74
openssh-debuginfo-5.3p1-81.el6.i686.rpm SHA-256: a7fe5756b24e1f4c779d10044b518d1673b9b1db61f1bbae775321f0860b1534
openssh-debuginfo-5.3p1-81.el6.i686.rpm SHA-256: a7fe5756b24e1f4c779d10044b518d1673b9b1db61f1bbae775321f0860b1534
openssh-ldap-5.3p1-81.el6.i686.rpm SHA-256: dba91daf80d3b5b810223bbc28a671616f08d7f58d850c472b31e3d5889fbbed
openssh-server-5.3p1-81.el6.i686.rpm SHA-256: 9e7db5f6b67967fac88fe4bd00a942aa3a7ede4609afb8d1f169d779cf7271ca
pam_ssh_agent_auth-0.9-81.el6.i686.rpm SHA-256: 1624e3e978e712ff93d90d3c7b0e986ab000c898d95337923078fe785b86e3b2

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
openssh-5.3p1-81.el6.src.rpm SHA-256: f50583ceaf29d3cafc4c6f52adc43fb75c0aa9d81c7a730a632df1238c27d88b
s390x
openssh-5.3p1-81.el6.s390x.rpm SHA-256: 2492f9b24308d09121528b9fc25e907e1fd52bc9494020a4bcf48cbaa3f715b7
openssh-askpass-5.3p1-81.el6.s390x.rpm SHA-256: 019b3610121c8f98941c893ec9f9135dd8340a0b8f2f847c297b971c6eabc4c9
openssh-clients-5.3p1-81.el6.s390x.rpm SHA-256: e46ce714c1a7e4f001108f08d4debd06c46811ea7cbbf40cc967ee471116eb1f
openssh-debuginfo-5.3p1-81.el6.s390.rpm SHA-256: 412b7b0076d2ad69e991e35c983a84238a7f85af6190ef0fa11ad01fde0d17ac
openssh-debuginfo-5.3p1-81.el6.s390x.rpm SHA-256: cf448d6fb2fce3781991d36d8679ca986ef067dd1089a818c76468cf1f775f36
openssh-debuginfo-5.3p1-81.el6.s390x.rpm SHA-256: cf448d6fb2fce3781991d36d8679ca986ef067dd1089a818c76468cf1f775f36
openssh-ldap-5.3p1-81.el6.s390x.rpm SHA-256: 7727ff0a4807f96e300c6aa81bfe3ef47e783b173c591098818b18af85a677fc
openssh-server-5.3p1-81.el6.s390x.rpm SHA-256: b52d6ebecc628910be3206fa20f8eb9008b5bb657508e3b873a7114a8e931193
pam_ssh_agent_auth-0.9-81.el6.s390.rpm SHA-256: fa8a36776839b6b412479494ccda22060910c07d5f357741730cf8b7aa531087
pam_ssh_agent_auth-0.9-81.el6.s390x.rpm SHA-256: e7ddb1270813a60b606c07039954d29527b9f8c5b76828e4b40d1844b8c95e5d

Red Hat Enterprise Linux for Power, big endian 6

SRPM
openssh-5.3p1-81.el6.src.rpm SHA-256: f50583ceaf29d3cafc4c6f52adc43fb75c0aa9d81c7a730a632df1238c27d88b
ppc64
openssh-5.3p1-81.el6.ppc64.rpm SHA-256: a104f6c05d2aab1964978ba87067349552475d8d9c7ec89a971f4642de43db18
openssh-askpass-5.3p1-81.el6.ppc64.rpm SHA-256: ecdf13562b407de1be1ca6114465b1ee2e98e0efc79efdd013d2d890ded5e253
openssh-clients-5.3p1-81.el6.ppc64.rpm SHA-256: 3bae517d684d9ce9bc250d62f2473c175ab93c29505658ae583542db67087c7e
openssh-debuginfo-5.3p1-81.el6.ppc.rpm SHA-256: d3728b34949f5ad976334c385343573928fa233fde3fa2e8a71c7121c98cfc69
openssh-debuginfo-5.3p1-81.el6.ppc64.rpm SHA-256: 2d9128818fb9444e26addfe7cecc9bb9d730ce511b72df577bb299bdd21c9ce2
openssh-debuginfo-5.3p1-81.el6.ppc64.rpm SHA-256: 2d9128818fb9444e26addfe7cecc9bb9d730ce511b72df577bb299bdd21c9ce2
openssh-ldap-5.3p1-81.el6.ppc64.rpm SHA-256: 540dcdf9253a2faf16c3aa119bbeee7ee00310d07cd7bb8542e9b6cba912630e
openssh-server-5.3p1-81.el6.ppc64.rpm SHA-256: b7cd24efe92e9dee44fcaae9eb6cb35c459ee5751e7348726166b2b8cf2b9854
pam_ssh_agent_auth-0.9-81.el6.ppc.rpm SHA-256: 85b93c6e239935e1dede3a7e8da9f556d6541e1383f65c5f1bb2f50f4307a5bf
pam_ssh_agent_auth-0.9-81.el6.ppc64.rpm SHA-256: fab590b2d757cdf5473b04e926e07b15c2161f8ed1987c88544a9afb81809a17

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
openssh-5.3p1-81.el6.src.rpm SHA-256: f50583ceaf29d3cafc4c6f52adc43fb75c0aa9d81c7a730a632df1238c27d88b
x86_64
openssh-5.3p1-81.el6.x86_64.rpm SHA-256: 7a4694ec8cad3ed4ddb8cf6ca04202583757c95f978deb06822c4f5b55be375b
openssh-askpass-5.3p1-81.el6.x86_64.rpm SHA-256: e84b7b795f9795f32ded187aae1840456120b843602b2cef9292f8ce346c2466
openssh-clients-5.3p1-81.el6.x86_64.rpm SHA-256: 7e9fdef71f30b0e50fca1a7f22c082c8e0c02cfa1ee6d9b9945c542d8f595635
openssh-debuginfo-5.3p1-81.el6.i686.rpm SHA-256: a7fe5756b24e1f4c779d10044b518d1673b9b1db61f1bbae775321f0860b1534
openssh-debuginfo-5.3p1-81.el6.x86_64.rpm SHA-256: 156f5db9af87ef9a2cfd742c5d7af79efd8ccca9671da97ca4c66aa1acbffe7a
openssh-debuginfo-5.3p1-81.el6.x86_64.rpm SHA-256: 156f5db9af87ef9a2cfd742c5d7af79efd8ccca9671da97ca4c66aa1acbffe7a
openssh-ldap-5.3p1-81.el6.x86_64.rpm SHA-256: 5a11eccf578745e58d4ee1d7358afb4666213d80f48ca8abf749b4625daf9427
openssh-server-5.3p1-81.el6.x86_64.rpm SHA-256: c2d139ee0565a0f55d3951ab7f7cbaa7b97db8143f9f79c6cf4a9b4a5e56f900
pam_ssh_agent_auth-0.9-81.el6.i686.rpm SHA-256: 1624e3e978e712ff93d90d3c7b0e986ab000c898d95337923078fe785b86e3b2
pam_ssh_agent_auth-0.9-81.el6.x86_64.rpm SHA-256: 0d3eae91db9f4d0fc225a2dd85e7d4fcf0eeea535297de16fea59d757baedf33

Red Hat Enterprise Linux Server from RHUI 6

SRPM
openssh-5.3p1-81.el6.src.rpm SHA-256: f50583ceaf29d3cafc4c6f52adc43fb75c0aa9d81c7a730a632df1238c27d88b
x86_64
openssh-5.3p1-81.el6.x86_64.rpm SHA-256: 7a4694ec8cad3ed4ddb8cf6ca04202583757c95f978deb06822c4f5b55be375b
openssh-askpass-5.3p1-81.el6.x86_64.rpm SHA-256: e84b7b795f9795f32ded187aae1840456120b843602b2cef9292f8ce346c2466
openssh-clients-5.3p1-81.el6.x86_64.rpm SHA-256: 7e9fdef71f30b0e50fca1a7f22c082c8e0c02cfa1ee6d9b9945c542d8f595635
openssh-debuginfo-5.3p1-81.el6.i686.rpm SHA-256: a7fe5756b24e1f4c779d10044b518d1673b9b1db61f1bbae775321f0860b1534
openssh-debuginfo-5.3p1-81.el6.x86_64.rpm SHA-256: 156f5db9af87ef9a2cfd742c5d7af79efd8ccca9671da97ca4c66aa1acbffe7a
openssh-debuginfo-5.3p1-81.el6.x86_64.rpm SHA-256: 156f5db9af87ef9a2cfd742c5d7af79efd8ccca9671da97ca4c66aa1acbffe7a
openssh-ldap-5.3p1-81.el6.x86_64.rpm SHA-256: 5a11eccf578745e58d4ee1d7358afb4666213d80f48ca8abf749b4625daf9427
openssh-server-5.3p1-81.el6.x86_64.rpm SHA-256: c2d139ee0565a0f55d3951ab7f7cbaa7b97db8143f9f79c6cf4a9b4a5e56f900
pam_ssh_agent_auth-0.9-81.el6.i686.rpm SHA-256: 1624e3e978e712ff93d90d3c7b0e986ab000c898d95337923078fe785b86e3b2
pam_ssh_agent_auth-0.9-81.el6.x86_64.rpm SHA-256: 0d3eae91db9f4d0fc225a2dd85e7d4fcf0eeea535297de16fea59d757baedf33
i386
openssh-5.3p1-81.el6.i686.rpm SHA-256: 00364fae94375c8d61767258e9d0ede09ffbd35726a361e8f31240c234662908
openssh-askpass-5.3p1-81.el6.i686.rpm SHA-256: 2ff4d91f02efe9ef0cfe8fc9535211b16c85ce038d964b254a2dadf186260d03
openssh-clients-5.3p1-81.el6.i686.rpm SHA-256: c94f4292cefd5e7efef7de3c47a215bd3197d2e828991a7d050e229e6f7f8a74
openssh-debuginfo-5.3p1-81.el6.i686.rpm SHA-256: a7fe5756b24e1f4c779d10044b518d1673b9b1db61f1bbae775321f0860b1534
openssh-debuginfo-5.3p1-81.el6.i686.rpm SHA-256: a7fe5756b24e1f4c779d10044b518d1673b9b1db61f1bbae775321f0860b1534
openssh-ldap-5.3p1-81.el6.i686.rpm SHA-256: dba91daf80d3b5b810223bbc28a671616f08d7f58d850c472b31e3d5889fbbed
openssh-server-5.3p1-81.el6.i686.rpm SHA-256: 9e7db5f6b67967fac88fe4bd00a942aa3a7ede4609afb8d1f169d779cf7271ca
pam_ssh_agent_auth-0.9-81.el6.i686.rpm SHA-256: 1624e3e978e712ff93d90d3c7b0e986ab000c898d95337923078fe785b86e3b2

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+