Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Red Hat Enterprise Linux 输入验证漏洞
Vulnerability Description
Red Hat Enterprise Linux是美国红帽(Red Hat)公司的面向企业用户的Linux操作系统 Red Hat Enterprise Linux 4存在输入验证漏洞,该漏洞源于使用合法的密钥签名时包含外部引入的修改,该修改允许软件包产生未知的影响。
CVSS Information
N/A
Vulnerability Type
N/A