| Name | CVE-2015-6565 | 
| Description | sshd in OpenSSH 6.8 and 6.9 uses world-writable permissions for TTY devices, which allows local users to cause a denial of service (terminal disruption) or possibly have unspecified other impact by writing to a device, as demonstrated by writing an escape sequence. | 
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) | 
The table below lists information on source packages.
| Source Package | Release | Version | Status | 
|---|---|---|---|
| openssh (PTS) | bullseye | 1:8.4p1-5+deb11u3 | fixed | 
| bullseye (security) | 1:8.4p1-5+deb11u5 | fixed | |
| bookworm | 1:9.2p1-2+deb12u7 | fixed | |
| bookworm (security) | 1:9.2p1-2+deb12u5 | fixed | |
| trixie | 1:10.0p1-7 | fixed | |
| forky, sid | 1:10.2p1-2 | fixed | 
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs | 
|---|---|---|---|---|---|---|
| openssh | source | (unstable) | (not affected) | 
- openssh <not-affected> (Vulnerable code introduce in V_6_8_P1)
https://anongit.mindrot.org/openssh.git/commit/?id=6f941396b6835ad18018845f515b0c4fe20be21a
Issue introduced with https://anongit.mindrot.org/openssh.git/commit/?id=a5883d4eccb94b16c355987f58f86a7dee17a0c2 (V_6_8_P1)
https://www.openwall.com/lists/oss-security/2015/08/12/1