Search for packages
| purl | pkg:deb/debian/openssh@1:3.8.1p1-4?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-kgja-5xxj-1ucg | OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting. |
CVE-2006-0883
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-16T09:18:18.064805+00:00 | Debian Importer | Fixing | VCID-kgja-5xxj-1ucg | https://security-tracker.debian.org/tracker/data/json | 38.4.0 |
| 2026-04-12T18:15:04.726819+00:00 | Debian Importer | Fixing | VCID-kgja-5xxj-1ucg | https://security-tracker.debian.org/tracker/data/json | 38.3.0 |
| 2026-04-03T07:48:51.392716+00:00 | Debian Importer | Fixing | VCID-kgja-5xxj-1ucg | https://security-tracker.debian.org/tracker/data/json | 38.1.0 |