Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2013:0519 - Security Advisory
Issued:
2013-02-21
Updated:
2013-02-21

RHSA-2013:0519 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: openssh security, bug fix and enhancement update

Type/Severity

Security Advisory: Moderate

Topic

Updated openssh packages that fix one security issue, multiple bugs, and
add various enhancements are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

OpenSSH is OpenBSD's Secure Shell (SSH) protocol implementation. These
packages include the core files necessary for the OpenSSH client and
server.

Due to the way the pam_ssh_agent_auth PAM module was built in Red Hat
Enterprise Linux 6, the glibc's error() function was called rather than the
intended error() function in pam_ssh_agent_auth to report errors. As these
two functions expect different arguments, it was possible for an attacker
to cause an application using pam_ssh_agent_auth to crash, disclose
portions of its memory or, potentially, execute arbitrary code.
(CVE-2012-5536)

Note that the pam_ssh_agent_auth module is not used in Red Hat Enterprise
Linux 6 by default.

This update also fixes the following bugs:

  • All possible options for the new RequiredAuthentications directive were
    not documented in the sshd_config man page. This update improves the man
    page to document all the possible options. (BZ#821641)
  • When stopping one instance of the SSH daemon (sshd), the sshd init script
    (/etc/rc.d/init.d/sshd) stopped all sshd processes regardless of the PID of
    the processes. This update improves the init script so that it only kills
    processes with the relevant PID. As a result, the init script now works
    more reliably in a multi-instance environment. (BZ#826720)
  • Due to a regression, the ssh-copy-id command returned an exit status code
    of zero even if there was an error in copying the key to a remote host.
    With this update, a patch has been applied and ssh-copy-id now returns a
    non-zero exit code if there is an error in copying the SSH certificate to a
    remote host. (BZ#836650)
  • When SELinux was disabled on the system, no on-disk policy was installed,
    a user account was used for a connection, and no "~/.ssh" configuration was
    present in that user's home directory, the SSH client terminated
    unexpectedly with a segmentation fault when attempting to connect to
    another system. A patch has been provided to address this issue and the
    crashes no longer occur in the described scenario. (BZ#836655)
  • The "HOWTO" document /usr/share/doc/openssh-ldap-5.3p1/HOWTO.ldap-keys
    incorrectly documented the use of the AuthorizedKeysCommand directive.
    This update corrects the document. (BZ#857760)

This update also adds the following enhancements:

  • When attempting to enable SSH for use with a Common Access Card (CAC),
    the ssh-agent utility read all the certificates in the card even though
    only the ID certificate was needed. Consequently, if a user entered their
    PIN incorrectly, then the CAC was locked, as a match for the PIN was
    attempted against all three certificates. With this update, ssh-add does
    not try the same PIN for every certificate if the PIN fails for the first
    one. As a result, the CAC will not be disabled if a user enters their PIN
    incorrectly. (BZ#782912)
  • This update adds a "netcat mode" to SSH. The "ssh -W host:port ..."
    command connects standard input and output (stdio) on a client to a single
    port on a server. As a result, SSH can be used to route connections via
    intermediate servers. (BZ#860809)
  • Due to a bug, arguments for the RequiredAuthentications2 directive were
    not stored in a Match block. Consequently, parsing of the config file was
    not in accordance with the man sshd_config documentation. This update fixes
    the bug and users can now use the required authentication feature to
    specify a list of authentication methods as expected according to the man
    page. (BZ#869903)

All users of openssh are advised to upgrade to these updated packages,
which fix these issues and add these enhancements. After installing this
update, the OpenSSH server daemon (sshd) will be restarted automatically.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for IBM z Systems 6 s390x
  • Red Hat Enterprise Linux for Power, big endian 6 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386

Fixes

  • BZ - 821641 - Document possible options to RequiredAuthentications1/2
  • BZ - 826720 - sshd initscript clobbers other sshd processes.
  • BZ - 834618 - CVE-2012-5536 pam_ssh_agent_auth: symbol crash leading to glibc error() called incorrectly
  • BZ - 836650 - ssh-copy-id returns 0 even if the actual operation fails.
  • BZ - 857760 - Error/typo in openssh-ldap HOWTO file
  • BZ - 869903 - RequiredAuthentications2 does not work in Match blocks as documented.

CVEs

  • CVE-2012-5536

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
openssh-5.3p1-84.1.el6.src.rpm SHA-256: d943c2596e8cb2ad094615b5a69205320812b61887debe07a57b4bf26a237b30
x86_64
openssh-5.3p1-84.1.el6.x86_64.rpm SHA-256: 400608b957c53a348fd05acf7be56b24ddbef0f49aebed30c8c9fa46a978b905
openssh-askpass-5.3p1-84.1.el6.x86_64.rpm SHA-256: ac9fb82c1b3e5c3bd41c555e7ad7812c69b52a1df93a401b0f25d08a564750f5
openssh-clients-5.3p1-84.1.el6.x86_64.rpm SHA-256: aa903886a2a04a27774ee6a420f36b39650d72144e165765b9c0c801ec11d5e2
openssh-debuginfo-5.3p1-84.1.el6.i686.rpm SHA-256: b13d9dc849c942d55948a409b3da837315c9c1cfd3092a218690f19c81dbd3e5
openssh-debuginfo-5.3p1-84.1.el6.x86_64.rpm SHA-256: df6c8dd25d582a21679e5a5e0c059fa680077d67c1bf65642f04f4ea3f9a056d
openssh-debuginfo-5.3p1-84.1.el6.x86_64.rpm SHA-256: df6c8dd25d582a21679e5a5e0c059fa680077d67c1bf65642f04f4ea3f9a056d
openssh-ldap-5.3p1-84.1.el6.x86_64.rpm SHA-256: 3f3780b0e403062a84c67b4023c08adc9d59854d9a9584fb1bcd4b22c605a24c
openssh-server-5.3p1-84.1.el6.x86_64.rpm SHA-256: 8b9c5f3840abb97b5b2b831d08005ab35be6309614c9c6b3185d65424a758bc0
pam_ssh_agent_auth-0.9.3-84.1.el6.i686.rpm SHA-256: c006402d0c7758c6e83a96d59837562b1dc13aad681ccb4517ad57eeab3ebb6c
pam_ssh_agent_auth-0.9.3-84.1.el6.x86_64.rpm SHA-256: 3fe861d4c4c3e6ed8047c00f4839f2a58123a7ed2ada7454b16e501fffa6827a
i386
openssh-5.3p1-84.1.el6.i686.rpm SHA-256: e7528ca490d2550b49ea1889acd943522967f193abc8aaffd500d9c1d29fd4dd
openssh-askpass-5.3p1-84.1.el6.i686.rpm SHA-256: 0c40d87e52cbcb81dfbd730371bedb0b59f8e30dc3aa1e7bebe578f3d86272d4
openssh-clients-5.3p1-84.1.el6.i686.rpm SHA-256: 2f56f48ec140596c58346b2a0453ea01cb54a8c1c536c3d33e77bf81d669f0a2
openssh-debuginfo-5.3p1-84.1.el6.i686.rpm SHA-256: b13d9dc849c942d55948a409b3da837315c9c1cfd3092a218690f19c81dbd3e5
openssh-debuginfo-5.3p1-84.1.el6.i686.rpm SHA-256: b13d9dc849c942d55948a409b3da837315c9c1cfd3092a218690f19c81dbd3e5
openssh-ldap-5.3p1-84.1.el6.i686.rpm SHA-256: a24e811d18e45b7f42248d1f64b64112a3f39ee17d05fe9682c80204a229687b
openssh-server-5.3p1-84.1.el6.i686.rpm SHA-256: 0341b5af8e3a2bc3c9a42d6a73f4e7f2d31ceccb4a65f1de395b08daf10f6f36
pam_ssh_agent_auth-0.9.3-84.1.el6.i686.rpm SHA-256: c006402d0c7758c6e83a96d59837562b1dc13aad681ccb4517ad57eeab3ebb6c

Red Hat Enterprise Linux Workstation 6

SRPM
openssh-5.3p1-84.1.el6.src.rpm SHA-256: d943c2596e8cb2ad094615b5a69205320812b61887debe07a57b4bf26a237b30
x86_64
openssh-5.3p1-84.1.el6.x86_64.rpm SHA-256: 400608b957c53a348fd05acf7be56b24ddbef0f49aebed30c8c9fa46a978b905
openssh-askpass-5.3p1-84.1.el6.x86_64.rpm SHA-256: ac9fb82c1b3e5c3bd41c555e7ad7812c69b52a1df93a401b0f25d08a564750f5
openssh-clients-5.3p1-84.1.el6.x86_64.rpm SHA-256: aa903886a2a04a27774ee6a420f36b39650d72144e165765b9c0c801ec11d5e2
openssh-debuginfo-5.3p1-84.1.el6.i686.rpm SHA-256: b13d9dc849c942d55948a409b3da837315c9c1cfd3092a218690f19c81dbd3e5
openssh-debuginfo-5.3p1-84.1.el6.x86_64.rpm SHA-256: df6c8dd25d582a21679e5a5e0c059fa680077d67c1bf65642f04f4ea3f9a056d
openssh-debuginfo-5.3p1-84.1.el6.x86_64.rpm SHA-256: df6c8dd25d582a21679e5a5e0c059fa680077d67c1bf65642f04f4ea3f9a056d
openssh-ldap-5.3p1-84.1.el6.x86_64.rpm SHA-256: 3f3780b0e403062a84c67b4023c08adc9d59854d9a9584fb1bcd4b22c605a24c
openssh-server-5.3p1-84.1.el6.x86_64.rpm SHA-256: 8b9c5f3840abb97b5b2b831d08005ab35be6309614c9c6b3185d65424a758bc0
pam_ssh_agent_auth-0.9.3-84.1.el6.i686.rpm SHA-256: c006402d0c7758c6e83a96d59837562b1dc13aad681ccb4517ad57eeab3ebb6c
pam_ssh_agent_auth-0.9.3-84.1.el6.x86_64.rpm SHA-256: 3fe861d4c4c3e6ed8047c00f4839f2a58123a7ed2ada7454b16e501fffa6827a
i386
openssh-5.3p1-84.1.el6.i686.rpm SHA-256: e7528ca490d2550b49ea1889acd943522967f193abc8aaffd500d9c1d29fd4dd
openssh-askpass-5.3p1-84.1.el6.i686.rpm SHA-256: 0c40d87e52cbcb81dfbd730371bedb0b59f8e30dc3aa1e7bebe578f3d86272d4
openssh-clients-5.3p1-84.1.el6.i686.rpm SHA-256: 2f56f48ec140596c58346b2a0453ea01cb54a8c1c536c3d33e77bf81d669f0a2
openssh-debuginfo-5.3p1-84.1.el6.i686.rpm SHA-256: b13d9dc849c942d55948a409b3da837315c9c1cfd3092a218690f19c81dbd3e5
openssh-debuginfo-5.3p1-84.1.el6.i686.rpm SHA-256: b13d9dc849c942d55948a409b3da837315c9c1cfd3092a218690f19c81dbd3e5
openssh-ldap-5.3p1-84.1.el6.i686.rpm SHA-256: a24e811d18e45b7f42248d1f64b64112a3f39ee17d05fe9682c80204a229687b
openssh-server-5.3p1-84.1.el6.i686.rpm SHA-256: 0341b5af8e3a2bc3c9a42d6a73f4e7f2d31ceccb4a65f1de395b08daf10f6f36
pam_ssh_agent_auth-0.9.3-84.1.el6.i686.rpm SHA-256: c006402d0c7758c6e83a96d59837562b1dc13aad681ccb4517ad57eeab3ebb6c

Red Hat Enterprise Linux Desktop 6

SRPM
openssh-5.3p1-84.1.el6.src.rpm SHA-256: d943c2596e8cb2ad094615b5a69205320812b61887debe07a57b4bf26a237b30
x86_64
openssh-5.3p1-84.1.el6.x86_64.rpm SHA-256: 400608b957c53a348fd05acf7be56b24ddbef0f49aebed30c8c9fa46a978b905
openssh-askpass-5.3p1-84.1.el6.x86_64.rpm SHA-256: ac9fb82c1b3e5c3bd41c555e7ad7812c69b52a1df93a401b0f25d08a564750f5
openssh-clients-5.3p1-84.1.el6.x86_64.rpm SHA-256: aa903886a2a04a27774ee6a420f36b39650d72144e165765b9c0c801ec11d5e2
openssh-debuginfo-5.3p1-84.1.el6.i686.rpm SHA-256: b13d9dc849c942d55948a409b3da837315c9c1cfd3092a218690f19c81dbd3e5
openssh-debuginfo-5.3p1-84.1.el6.x86_64.rpm SHA-256: df6c8dd25d582a21679e5a5e0c059fa680077d67c1bf65642f04f4ea3f9a056d
openssh-debuginfo-5.3p1-84.1.el6.x86_64.rpm SHA-256: df6c8dd25d582a21679e5a5e0c059fa680077d67c1bf65642f04f4ea3f9a056d
openssh-ldap-5.3p1-84.1.el6.x86_64.rpm SHA-256: 3f3780b0e403062a84c67b4023c08adc9d59854d9a9584fb1bcd4b22c605a24c
openssh-server-5.3p1-84.1.el6.x86_64.rpm SHA-256: 8b9c5f3840abb97b5b2b831d08005ab35be6309614c9c6b3185d65424a758bc0
pam_ssh_agent_auth-0.9.3-84.1.el6.i686.rpm SHA-256: c006402d0c7758c6e83a96d59837562b1dc13aad681ccb4517ad57eeab3ebb6c
pam_ssh_agent_auth-0.9.3-84.1.el6.x86_64.rpm SHA-256: 3fe861d4c4c3e6ed8047c00f4839f2a58123a7ed2ada7454b16e501fffa6827a
i386
openssh-5.3p1-84.1.el6.i686.rpm SHA-256: e7528ca490d2550b49ea1889acd943522967f193abc8aaffd500d9c1d29fd4dd
openssh-askpass-5.3p1-84.1.el6.i686.rpm SHA-256: 0c40d87e52cbcb81dfbd730371bedb0b59f8e30dc3aa1e7bebe578f3d86272d4
openssh-clients-5.3p1-84.1.el6.i686.rpm SHA-256: 2f56f48ec140596c58346b2a0453ea01cb54a8c1c536c3d33e77bf81d669f0a2
openssh-debuginfo-5.3p1-84.1.el6.i686.rpm SHA-256: b13d9dc849c942d55948a409b3da837315c9c1cfd3092a218690f19c81dbd3e5
openssh-debuginfo-5.3p1-84.1.el6.i686.rpm SHA-256: b13d9dc849c942d55948a409b3da837315c9c1cfd3092a218690f19c81dbd3e5
openssh-ldap-5.3p1-84.1.el6.i686.rpm SHA-256: a24e811d18e45b7f42248d1f64b64112a3f39ee17d05fe9682c80204a229687b
openssh-server-5.3p1-84.1.el6.i686.rpm SHA-256: 0341b5af8e3a2bc3c9a42d6a73f4e7f2d31ceccb4a65f1de395b08daf10f6f36
pam_ssh_agent_auth-0.9.3-84.1.el6.i686.rpm SHA-256: c006402d0c7758c6e83a96d59837562b1dc13aad681ccb4517ad57eeab3ebb6c

Red Hat Enterprise Linux for IBM z Systems 6

SRPM
openssh-5.3p1-84.1.el6.src.rpm SHA-256: d943c2596e8cb2ad094615b5a69205320812b61887debe07a57b4bf26a237b30
s390x
openssh-5.3p1-84.1.el6.s390x.rpm SHA-256: 09da386b1328301e51e2ee9bfc8ebebd0b6aafcc3025f97d6014ff11f835c7a9
openssh-askpass-5.3p1-84.1.el6.s390x.rpm SHA-256: 3a51180d5935f2c9a20bb7792fe12c1cbb312e64af43d9db1cd38a7a2c86a95d
openssh-clients-5.3p1-84.1.el6.s390x.rpm SHA-256: fbd2e558c845dbe4b47bdc592b2a6b3df77409c0b87b04326dce81e7991b5e00
openssh-debuginfo-5.3p1-84.1.el6.s390.rpm SHA-256: c994e13dd30fc2f79cf8e6f592a714bbf0706717f7346990e614848fa4e199fb
openssh-debuginfo-5.3p1-84.1.el6.s390x.rpm SHA-256: 42c1913a71249525b27848238cc38bf458c8375715f226ca88af96451927a626
openssh-debuginfo-5.3p1-84.1.el6.s390x.rpm SHA-256: 42c1913a71249525b27848238cc38bf458c8375715f226ca88af96451927a626
openssh-ldap-5.3p1-84.1.el6.s390x.rpm SHA-256: fe29b1dc2408e62d846a63c0315ef4130b3cf6dc2e3d93ab865b8e4bb94d4762
openssh-server-5.3p1-84.1.el6.s390x.rpm SHA-256: 2365e23035c6424aac19146206e5bfbaf0f48906a70d4613b9b872df3d20a082
pam_ssh_agent_auth-0.9.3-84.1.el6.s390.rpm SHA-256: 6fae7bd5564999e8683fd8ec570ba5cd39c6e12535df4c290411441faec24d50
pam_ssh_agent_auth-0.9.3-84.1.el6.s390x.rpm SHA-256: 32f62746c60fa4d4be31f9162a365560dca145575271a271beafd93aed6d95fa

Red Hat Enterprise Linux for Power, big endian 6

SRPM
openssh-5.3p1-84.1.el6.src.rpm SHA-256: d943c2596e8cb2ad094615b5a69205320812b61887debe07a57b4bf26a237b30
ppc64
openssh-5.3p1-84.1.el6.ppc64.rpm SHA-256: 15555a1dd744dbadf058f6f6f42533739839ae5e18a80849a33e056effcfc805
openssh-askpass-5.3p1-84.1.el6.ppc64.rpm SHA-256: 25cd9497e66535934ba7b9cf945a1f7312b4144997651ba3dde4f7474e8588e7
openssh-clients-5.3p1-84.1.el6.ppc64.rpm SHA-256: 8f336377c7aed19137e56d6df950d55a8fe6340cd2694c5b9c4cf65277143d7e
openssh-debuginfo-5.3p1-84.1.el6.ppc.rpm SHA-256: 37ccbd38a7976a6034ba3d2a19270c86fbc46b2da675fbb80419163e0b935633
openssh-debuginfo-5.3p1-84.1.el6.ppc64.rpm SHA-256: a9ad54b0f8f3d7cd1b5bbb962986d958a2fb051bc87d3870ba931aee03edda92
openssh-debuginfo-5.3p1-84.1.el6.ppc64.rpm SHA-256: a9ad54b0f8f3d7cd1b5bbb962986d958a2fb051bc87d3870ba931aee03edda92
openssh-ldap-5.3p1-84.1.el6.ppc64.rpm SHA-256: e219eb98e8f939af8ae70858b807e1fbe444933093b87edb81b62aed241b0eb9
openssh-server-5.3p1-84.1.el6.ppc64.rpm SHA-256: 4b1a5cb93fc806aeb3def75fc608fc8fbf8ce5c412d3d915da8ba9cadc340ec2
pam_ssh_agent_auth-0.9.3-84.1.el6.ppc.rpm SHA-256: b8430de3a6a2653ca8603226c1327a5e4ab8086cf38a9d9ae7cb4fb79bf528f9
pam_ssh_agent_auth-0.9.3-84.1.el6.ppc64.rpm SHA-256: 5e2d5016ec8f3883a2ed46fbef1a3bd054f960ae40f640a72f2034c7d373b9e4

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
openssh-5.3p1-84.1.el6.src.rpm SHA-256: d943c2596e8cb2ad094615b5a69205320812b61887debe07a57b4bf26a237b30
x86_64
openssh-5.3p1-84.1.el6.x86_64.rpm SHA-256: 400608b957c53a348fd05acf7be56b24ddbef0f49aebed30c8c9fa46a978b905
openssh-askpass-5.3p1-84.1.el6.x86_64.rpm SHA-256: ac9fb82c1b3e5c3bd41c555e7ad7812c69b52a1df93a401b0f25d08a564750f5
openssh-clients-5.3p1-84.1.el6.x86_64.rpm SHA-256: aa903886a2a04a27774ee6a420f36b39650d72144e165765b9c0c801ec11d5e2
openssh-debuginfo-5.3p1-84.1.el6.i686.rpm SHA-256: b13d9dc849c942d55948a409b3da837315c9c1cfd3092a218690f19c81dbd3e5
openssh-debuginfo-5.3p1-84.1.el6.x86_64.rpm SHA-256: df6c8dd25d582a21679e5a5e0c059fa680077d67c1bf65642f04f4ea3f9a056d
openssh-debuginfo-5.3p1-84.1.el6.x86_64.rpm SHA-256: df6c8dd25d582a21679e5a5e0c059fa680077d67c1bf65642f04f4ea3f9a056d
openssh-ldap-5.3p1-84.1.el6.x86_64.rpm SHA-256: 3f3780b0e403062a84c67b4023c08adc9d59854d9a9584fb1bcd4b22c605a24c
openssh-server-5.3p1-84.1.el6.x86_64.rpm SHA-256: 8b9c5f3840abb97b5b2b831d08005ab35be6309614c9c6b3185d65424a758bc0
pam_ssh_agent_auth-0.9.3-84.1.el6.i686.rpm SHA-256: c006402d0c7758c6e83a96d59837562b1dc13aad681ccb4517ad57eeab3ebb6c
pam_ssh_agent_auth-0.9.3-84.1.el6.x86_64.rpm SHA-256: 3fe861d4c4c3e6ed8047c00f4839f2a58123a7ed2ada7454b16e501fffa6827a

Red Hat Enterprise Linux Server from RHUI 6

SRPM
openssh-5.3p1-84.1.el6.src.rpm SHA-256: d943c2596e8cb2ad094615b5a69205320812b61887debe07a57b4bf26a237b30
x86_64
openssh-5.3p1-84.1.el6.x86_64.rpm SHA-256: 400608b957c53a348fd05acf7be56b24ddbef0f49aebed30c8c9fa46a978b905
openssh-askpass-5.3p1-84.1.el6.x86_64.rpm SHA-256: ac9fb82c1b3e5c3bd41c555e7ad7812c69b52a1df93a401b0f25d08a564750f5
openssh-clients-5.3p1-84.1.el6.x86_64.rpm SHA-256: aa903886a2a04a27774ee6a420f36b39650d72144e165765b9c0c801ec11d5e2
openssh-debuginfo-5.3p1-84.1.el6.i686.rpm SHA-256: b13d9dc849c942d55948a409b3da837315c9c1cfd3092a218690f19c81dbd3e5
openssh-debuginfo-5.3p1-84.1.el6.x86_64.rpm SHA-256: df6c8dd25d582a21679e5a5e0c059fa680077d67c1bf65642f04f4ea3f9a056d
openssh-debuginfo-5.3p1-84.1.el6.x86_64.rpm SHA-256: df6c8dd25d582a21679e5a5e0c059fa680077d67c1bf65642f04f4ea3f9a056d
openssh-ldap-5.3p1-84.1.el6.x86_64.rpm SHA-256: 3f3780b0e403062a84c67b4023c08adc9d59854d9a9584fb1bcd4b22c605a24c
openssh-server-5.3p1-84.1.el6.x86_64.rpm SHA-256: 8b9c5f3840abb97b5b2b831d08005ab35be6309614c9c6b3185d65424a758bc0
pam_ssh_agent_auth-0.9.3-84.1.el6.i686.rpm SHA-256: c006402d0c7758c6e83a96d59837562b1dc13aad681ccb4517ad57eeab3ebb6c
pam_ssh_agent_auth-0.9.3-84.1.el6.x86_64.rpm SHA-256: 3fe861d4c4c3e6ed8047c00f4839f2a58123a7ed2ada7454b16e501fffa6827a
i386
openssh-5.3p1-84.1.el6.i686.rpm SHA-256: e7528ca490d2550b49ea1889acd943522967f193abc8aaffd500d9c1d29fd4dd
openssh-askpass-5.3p1-84.1.el6.i686.rpm SHA-256: 0c40d87e52cbcb81dfbd730371bedb0b59f8e30dc3aa1e7bebe578f3d86272d4
openssh-clients-5.3p1-84.1.el6.i686.rpm SHA-256: 2f56f48ec140596c58346b2a0453ea01cb54a8c1c536c3d33e77bf81d669f0a2
openssh-debuginfo-5.3p1-84.1.el6.i686.rpm SHA-256: b13d9dc849c942d55948a409b3da837315c9c1cfd3092a218690f19c81dbd3e5
openssh-debuginfo-5.3p1-84.1.el6.i686.rpm SHA-256: b13d9dc849c942d55948a409b3da837315c9c1cfd3092a218690f19c81dbd3e5
openssh-ldap-5.3p1-84.1.el6.i686.rpm SHA-256: a24e811d18e45b7f42248d1f64b64112a3f39ee17d05fe9682c80204a229687b
openssh-server-5.3p1-84.1.el6.i686.rpm SHA-256: 0341b5af8e3a2bc3c9a42d6a73f4e7f2d31ceccb4a65f1de395b08daf10f6f36
pam_ssh_agent_auth-0.9.3-84.1.el6.i686.rpm SHA-256: c006402d0c7758c6e83a96d59837562b1dc13aad681ccb4517ad57eeab3ebb6c

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+