-
[How to file a helpful issue](https://www.qubes-os.org/doc/issue-tracking/)
### Qubes OS release
R4.2
### Brief summary
OpenSSH server is not installed in dom0 by default. But when install…
-
**Describe the bug**
Potential remote code execution in OpenSSH server. Details at https://www.cve.org/CVERecord?id=CVE-2024-6387
**Additional context**
Mitigation: Set LoginGraceTime to 0 in /…
-
## CVE-2024-6387 - Critical Severity Vulnerability
Vulnerable Libraries - src3.1.5, src3.1.5, src3.1.5, src3.1.5, src3.1.5, src3.1.5
Vulnerability Details
A critical vulnerability in ssh…
-
## CVE-2024-6387 - Critical Severity Vulnerability
Vulnerable Libraries - src3.1.5, src3.1.5, src3.1.5, src3.1.5, src3.1.5, src3.1.5
Vulnerability Details
A critical vulnerability in ssh…
-
## CVE-2024-6387 - Critical Severity Vulnerability
Vulnerable Libraries - src3.1.5, src3.1.5, src3.1.5, src3.1.5, src3.1.5, src3.1.5
Vulnerability Details
A critical vulnerability in ssh…
-
### What happened?
The [official documentation](https://docs.crowdsec.net/docs/parsers/patterns/#emailaddress) specifies the following pattern for email parsing:
`%{EMAILLOCALPART}@%{HOSTNAME}`
…
-
-
# Description
A critical vulnerability in sshd(8) was present in portable OpenSSH versions between 8.5p1 and 9.7p1 (inclusive) that may allow arbitrary code execution with root privileges.
OpenB…
-
Enumerate versions of OpenSSH on our public-facing servers.
See https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt.
-
```
pete@ardbeg ~ % dig +short cerberus2.xxxx.com A
pete@ardbeg ~ % dig +short cerberus2.xxxx.com AAAA
xxxx:xxxx:xxxx:xxxx::1400:0
pete@ardbeg ~ % ./CVE-2024-6387_Check.py cerberus2.xxxx.com
…