Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
24 Apr 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Sep 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 Jul 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Jul 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Jul 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Jul 2024, 18:07
Type | Values Removed | Values Added |
---|---|---|
CPE | ||
References | () https://github.com/PowerShell/Win32-OpenSSH/issues/2249 - Issue Tracking, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/4 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/11/1 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/11/3 - Mailing List, Third Party Advisory | |
References | () https://github.com/PowerShell/Win32-OpenSSH/discussions/2248 - Issue Tracking, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/09/5 - Mailing List, Third Party Advisory | |
References | () https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do - Third Party Advisory | |
References | () https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/04/1 - Mailing List, Third Party Advisory | |
References | () https://github.com/microsoft/azurelinux/issues/9555 - Issue Tracking, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4479 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2294604 - Issue Tracking, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/1 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/08/2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/23/4 - Mailing List, Third Party Advisory | |
References | () https://github.com/rapier1/hpn-ssh/issues/87 - Issue Tracking, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/23/6 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/09/2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/01/12 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/02/1 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/04/2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/3 - Mailing List, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4469 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/01/13 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/08/3 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/1 - Mailing List, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4474 - Third Party Advisory | |
References | () https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100 - Third Party Advisory | |
References | () https://www.openssh.com/txt/release-9.8 - Release Notes, Third Party Advisory | |
References | () https://github.com/AlmaLinux/updates/issues/629 - Issue Tracking, Third Party Advisory | |
References | () https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/5 - Mailing List, Third Party Advisory | |
References | () https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132 - Third Party Advisory | |
References | () https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4340 - Third Party Advisory | |
References | () https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/ - Mailing List, Third Party Advisory | |
References | () https://github.com/oracle/oracle-linux/issues/149 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/Azure/AKS/issues/4379 - Issue Tracking, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/6 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/4 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/2 - Mailing List, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4389 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2024:4484 - Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=40843778 - Issue Tracking, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/11 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/10/3 - Mailing List, Third Party Advisory |
23 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Jul 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
17 Jul 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. |
11 Jul 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Jul 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Jul 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jul 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jul 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Jul 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Jul 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
08 Jul 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Jul 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Jul 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Jul 2024, 15:53
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
CWE | CWE-362 | |
CPE | cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p9:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p5:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.8:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p8:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p2:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:lts:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p7:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p5:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p4:*:*:*:*:*:* cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:rc3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p6:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p11:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.1:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.3:p2:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:* cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.3:p3:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:22.10:*:*:*:-:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p10:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_micro:6.0:*:*:*:*:*:*:* cpe:2.3:o:amazon:linux_2023:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.3:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:beta5:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p1:*:*:*:*:*:* cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p1:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:8.5:p1:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:4.4:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p7:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:rc4-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p6:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.1:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:14.0:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.3:-:*:*:*:*:*:* |
|
References |
|
|
References | () https://github.com/PowerShell/Win32-OpenSSH/issues/2249 - Issue Tracking | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/4 - Mailing List | |
References | () https://explore.alas.aws.amazon.com/CVE-2024-6387.html - Third Party Advisory | |
References | () https://ubuntu.com/security/CVE-2024-6387 - Third Party Advisory | |
References | () https://github.com/PowerShell/Win32-OpenSSH/discussions/2248 - Issue Tracking | |
References | () http://www.openwall.com/lists/oss-security/2024/07/04/1 - Mailing List | |
References | () https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/ - Third Party Advisory | |
References | () https://github.com/microsoft/azurelinux/issues/9555 - Issue Tracking | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2294604 - Issue Tracking | |
References | () https://github.com/zgzhang/cve-2024-6387-poc - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/1 - Mailing List | |
References | () https://github.com/rapier1/hpn-ssh/issues/87 - Issue Tracking | |
References | () https://security.netapp.com/advisory/ntap-20240701-0001/ - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/01/12 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/02/1 - Mailing List | |
References | () https://access.redhat.com/errata/RHSA-2024:4312 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/04/2 - Mailing List | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/3 - Mailing List | |
References | () https://security-tracker.debian.org/tracker/CVE-2024-6387 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/01/13 - Mailing List | |
References | () https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html - Mailing List, Third Party Advisory | |
References | () https://www.suse.com/security/cve/CVE-2024-6387.html - Third Party Advisory | |
References | () https://www.openssh.com/txt/release-9.8 - Release Notes | |
References | () https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc - Third Party Advisory | |
References | () https://github.com/AlmaLinux/updates/issues/629 - Issue Tracking | |
References | () https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html - Mailing List, Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/5 - Mailing List | |
References | () https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/ - Third Party Advisory | |
References | () https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc - Third Party Advisory | |
References | () https://www.theregister.com/2024/07/01/regresshion_openssh/ - Third Party Advisory | |
References | () https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/ - Press/Media Coverage, Third Party Advisory | |
References | () https://github.com/oracle/oracle-linux/issues/149 - Issue Tracking | |
References | () https://github.com/Azure/AKS/issues/4379 - Issue Tracking | |
References | () https://access.redhat.com/security/cve/CVE-2024-6387 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/2 - Mailing List | |
References | () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010 - Third Party Advisory | |
References | () https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt - Exploit, Third Party Advisory | |
References | () https://news.ycombinator.com/item?id=40843778 - Issue Tracking, Patch | |
References | () http://www.openwall.com/lists/oss-security/2024/07/03/11 - Mailing List | |
References | () https://ubuntu.com/security/notices/USN-6859-1 - Third Party Advisory | |
References | () https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server - Exploit, Third Party Advisory | |
First Time |
Netapp e-series Santricity Os Controller
Redhat enterprise Linux For Arm 64 Eus Redhat enterprise Linux For Power Little Endian Eus Freebsd freebsd Debian debian Linux Redhat enterprise Linux For Ibm Z Systems Freebsd Redhat openshift Container Platform Openbsd openssh Canonical Suse Netapp Redhat Debian Redhat enterprise Linux Server Aus Suse linux Enterprise Micro Netbsd netbsd Netapp ontap Tools Redhat enterprise Linux Eus Netapp ontap Select Deploy Administration Utility Amazon linux 2023 Canonical ubuntu Linux Netbsd Redhat enterprise Linux For Power Little Endian Amazon Redhat enterprise Linux For Arm 64 Openbsd Redhat enterprise Linux Redhat enterprise Linux For Ibm Z Systems Eus |
04 Jul 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Jul 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jul 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jul 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jul 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jul 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Jul 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. |
02 Jul 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Jul 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Jul 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Jul 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Jul 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Jul 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Published : 2024-07-01 13:15
Updated : 2025-04-24 19:15
NVD link : CVE-2024-6387
Mitre link : CVE-2024-6387
JSON object : View
redhat
- enterprise_linux_for_power_little_endian_eus
- openshift_container_platform
- enterprise_linux_for_arm_64
- enterprise_linux_for_ibm_z_systems_eus
- enterprise_linux_server_aus
- enterprise_linux_for_arm_64_eus
- enterprise_linux_for_ibm_z_systems
- enterprise_linux_for_power_little_endian
- enterprise_linux_eus
- enterprise_linux
canonical
- ubuntu_linux
netbsd
- netbsd
openbsd
- openssh
debian
- debian_linux
netapp
- e-series_santricity_os_controller
- ontap_tools
- ontap_select_deploy_administration_utility
freebsd
- freebsd
amazon
- linux_2023
suse
- linux_enterprise_micro
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')