{ "id": "CVE-2024-6387", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-01T13:15:06.467", "lastModified": "2024-07-16T22:15:06.133", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period." }, { "lang": "es", "value": "Se encontr\u00f3 una condici\u00f3n de ejecuci\u00f3n del controlador de se\u00f1ales en el servidor de OpenSSH (sshd), donde un cliente no se autentica dentro de los segundos de LoginGraceTime (120 de forma predeterminada, 600 en versiones anteriores de OpenSSH), luego se llama al controlador SIGALRM de sshd de forma asincr\u00f3nica. Sin embargo, este controlador de se\u00f1ales llama a varias funciones que no son seguras para se\u00f1ales as\u00edncronas, por ejemplo, syslog()." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.2, "impactScore": 5.9 }, { "source": "secalert@redhat.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.2, "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-362" } ] }, { "source": "secalert@redhat.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-364" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.4", "matchCriteriaId": "1102FFF5-77B1-400E-93F8-AC6CFE2CC93C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.6", "versionEndExcluding": "9.8", "matchCriteriaId": "EC13B91D-82A4-48B1-83AB-EC129C83D316" }, { "vulnerable": true, "criteria": "cpe:2.3:a:openbsd:openssh:4.4:-:*:*:*:*:*:*", "matchCriteriaId": "4C37CBBB-A4AA-40D0-9609-0620FDC12BA8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:openbsd:openssh:8.5:p1:*:*:*:*:*:*", "matchCriteriaId": "7945F60B-460E-4CA6-9EB4-BEE663386D50" }, { "vulnerable": true, "criteria": "cpe:2.3:a:openbsd:openssh:9.8:-:*:*:*:*:*:*", "matchCriteriaId": "BF2C0441-653D-4BD3-A45D-D97C929A596F" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "932D137F-528B-4526-9A89-CD59FA1AB0FE" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*", "matchCriteriaId": "B03506D7-0FCD-47B7-90F6-DDEEB5C5A733" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*", "matchCriteriaId": "2F7DAD7C-9369-4A87-A1D0-4208D3AF0CDC" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*", "matchCriteriaId": "01363FFA-F7A6-43FC-8D47-E67F95410095" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*", "matchCriteriaId": "FB056B47-1F45-4CE4-81F6-872F66C24C29" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*", "matchCriteriaId": "F843B777-5C64-4CAE-80D6-89DC2C9515B1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*", "matchCriteriaId": "E07C1C58-0E5F-4B56-9B8D-5DE67DB00F79" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*", "matchCriteriaId": "FC3CBA5D-9E5D-4C46-B37E-7BB35BE8DADB" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*", "matchCriteriaId": "39D345D3-108A-4551-A112-5EE51991411A" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:suse:linux_enterprise_micro:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "09F471C6-69AF-4E78-8143-17E783C80B9F" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.10:*:*:*:-:*:*:*", "matchCriteriaId": "47842532-D2B6-44CB-ADE2-4AC8630A4D8C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:lts:*:*:*", "matchCriteriaId": "21538C5B-A130-411E-B5F7-BBBA4C9D488A" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:amazon:linux_2023:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D4BE4FC-249C-4B58-9513-BF482444CB64" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "versionStartIncluding": "11.0.0", "versionEndIncluding": "11.70.2", "matchCriteriaId": "8C5DA53D-744B-4087-AEA9-257F18949E4D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797" }, { "vulnerable": true, "criteria": "cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "C2D814BE-93EC-42EF-88C5-EA7E7DF07BE5" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:*", "matchCriteriaId": "A87EFA20-DD6B-41C5-98FD-A29F67D2E732" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p1:*:*:*:*:*:*", "matchCriteriaId": "2888B0C1-4D85-42EC-9696-03FAD0A9C28F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p10:*:*:*:*:*:*", "matchCriteriaId": "556F4943-7BA4-4E09-94B3-4515DC3C7807" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p11:*:*:*:*:*:*", "matchCriteriaId": "6AFEC561-D79B-498B-B59D-1D82B21BDF1A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p2:*:*:*:*:*:*", "matchCriteriaId": "A3306F11-D3C0-41D6-BB5E-2ABDC3927715" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p3:*:*:*:*:*:*", "matchCriteriaId": "9E584FE1-3A34-492B-B10F-508DA7CBA768" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p4:*:*:*:*:*:*", "matchCriteriaId": "A5605E90-D125-4CC9-8B9F-F5EED9D4EE0C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p5:*:*:*:*:*:*", "matchCriteriaId": "761B4382-E857-4868-9F80-189B7F60256B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p6:*:*:*:*:*:*", "matchCriteriaId": "51B17801-15FD-4425-BA6C-BE06B14F1BFE" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p7:*:*:*:*:*:*", "matchCriteriaId": "E9CAFF74-AD36-4D29-83F3-23E0417C485D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p8:*:*:*:*:*:*", "matchCriteriaId": "1B2D2A82-BFFE-45FE-9F79-4AF12C6DE69D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.2:p9:*:*:*:*:*:*", "matchCriteriaId": "E7A81663-047E-4328-BE3A-CF65AB55B29F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.3:-:*:*:*:*:*:*", "matchCriteriaId": "17DAE911-21E1-4182-85A0-B9F0059DDA7F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p1:*:*:*:*:*:*", "matchCriteriaId": "ABEA48EC-24EA-4106-9465-CE66B938635F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p2:*:*:*:*:*:*", "matchCriteriaId": "8DFB5BD0-E777-4CAA-B2E0-3F3357D06D01" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:13.3:p3:*:*:*:*:*:*", "matchCriteriaId": "BC8C769C-A23E-4F61-AC42-4DA64421B096" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:14.0:-:*:*:*:*:*:*", "matchCriteriaId": "FA25530A-133C-4D7C-8993-D5C42D79A0B5" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:14.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "DB7B021E-F4AD-44AC-96AB-8ACAF8AB1B88" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p1:*:*:*:*:*:*", "matchCriteriaId": "69A72B5A-2189-4700-8E8B-1E5E7CA86C40" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p2:*:*:*:*:*:*", "matchCriteriaId": "5771F187-281B-4680-B562-EFC7441A8F88" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p3:*:*:*:*:*:*", "matchCriteriaId": "0A4437F5-9DDA-4769-974E-23BFA085E0DB" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p4:*:*:*:*:*:*", "matchCriteriaId": "A9C3A3D4-C9F4-41EB-B532-821AF83470B1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p5:*:*:*:*:*:*", "matchCriteriaId": "878A1F0A-087F-47D7-9CA5-A54BB8D6676A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p6:*:*:*:*:*:*", "matchCriteriaId": "CE73CDC3-B5A7-4921-89C6-8F9DC426CB3E" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:14.0:p7:*:*:*:*:*:*", "matchCriteriaId": "50A5E650-31FB-45BE-8827-641B58A83E45" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:14.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "038E5B85-7F60-4D71-8D3F-EDBF6E036CE0" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:14.0:rc4-p1:*:*:*:*:*:*", "matchCriteriaId": "BF309824-D379-4749-A1FA-BCB2987DD671" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:14.1:-:*:*:*:*:*:*", "matchCriteriaId": "79D770C6-7A57-4A49-8164-C55391F62301" }, { "vulnerable": true, "criteria": "cpe:2.3:o:freebsd:freebsd:14.1:p1:*:*:*:*:*:*", "matchCriteriaId": "AA813990-8C8F-4EE8-9F2B-9F73C510A7B2" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:*", "versionEndIncluding": "10.0.0", "matchCriteriaId": "A6A2EBE8-012E-470E-9E56-56ACBE345F78" } ] } ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/01/12", "source": "secalert@redhat.com", "tags": [ "Mailing List" ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/01/13", "source": "secalert@redhat.com", "tags": [ "Mailing List" ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/02/1", "source": "secalert@redhat.com", "tags": [ "Mailing List" ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/03/1", "source": "secalert@redhat.com", "tags": [ "Mailing List" ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/03/11", "source": "secalert@redhat.com", "tags": [ "Mailing List" ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/03/2", "source": "secalert@redhat.com", "tags": [ "Mailing List" ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/03/3", "source": "secalert@redhat.com", "tags": [ "Mailing List" ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/03/4", "source": "secalert@redhat.com", "tags": [ "Mailing List" ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/03/5", "source": "secalert@redhat.com", "tags": [ "Mailing List" ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/04/1", "source": "secalert@redhat.com", "tags": [ "Mailing List" ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/04/2", "source": "secalert@redhat.com", "tags": [ "Mailing List" ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/08/2", "source": "secalert@redhat.com" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/08/3", "source": "secalert@redhat.com" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/09/2", "source": "secalert@redhat.com" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/09/5", "source": "secalert@redhat.com" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/10/1", "source": "secalert@redhat.com" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/10/2", "source": "secalert@redhat.com" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/10/3", "source": "secalert@redhat.com" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/10/4", "source": "secalert@redhat.com" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/10/6", "source": "secalert@redhat.com" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/11/1", "source": "secalert@redhat.com" }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/11/3", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2024:4312", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:4340", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2024:4389", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/errata/RHSA-2024:4469", "source": "secalert@redhat.com" }, { "url": "https://access.redhat.com/security/cve/CVE-2024-6387", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/", "source": "secalert@redhat.com", "tags": [ "Press/Media Coverage", "Third Party Advisory" ] }, { "url": "https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server", "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294604", "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ] }, { "url": "https://explore.alas.aws.amazon.com/CVE-2024-6387.html", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132", "source": "secalert@redhat.com" }, { "url": "https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://github.com/AlmaLinux/updates/issues/629", "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ] }, { "url": "https://github.com/Azure/AKS/issues/4379", "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ] }, { "url": "https://github.com/PowerShell/Win32-OpenSSH/discussions/2248", "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ] }, { "url": "https://github.com/PowerShell/Win32-OpenSSH/issues/2249", "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ] }, { "url": "https://github.com/microsoft/azurelinux/issues/9555", "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ] }, { "url": "https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09", "source": "secalert@redhat.com" }, { "url": "https://github.com/oracle/oracle-linux/issues/149", "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ] }, { "url": "https://github.com/rapier1/hpn-ssh/issues/87", "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ] }, { "url": "https://github.com/zgzhang/cve-2024-6387-poc", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/", "source": "secalert@redhat.com" }, { "url": "https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html", "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ] }, { "url": "https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html", "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch" ] }, { "url": "https://news.ycombinator.com/item?id=40843778", "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch" ] }, { "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://security-tracker.debian.org/tracker/CVE-2024-6387", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://security.netapp.com/advisory/ntap-20240701-0001/", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://sig-security.rocky.page/issues/CVE-2024-6387/", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://ubuntu.com/security/CVE-2024-6387", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://ubuntu.com/security/notices/USN-6859-1", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do", "source": "secalert@redhat.com" }, { "url": "https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100", "source": "secalert@redhat.com" }, { "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://www.openssh.com/txt/release-9.8", "source": "secalert@redhat.com", "tags": [ "Release Notes" ] }, { "url": "https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt", "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html", "source": "secalert@redhat.com" }, { "url": "https://www.suse.com/security/cve/CVE-2024-6387.html", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://www.theregister.com/2024/07/01/regresshion_openssh/", "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ] } ] }