-
**Describe scenario**
A CVE has been issued for a vulnerability in OpenSSH - https://www.qualys.com/regresshion-cve-2024-6387/
**Question**
Google are releasing a patched version of GKE to co…
-
> A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SI…
-
### Describe your issue as much as you can
I'm assuming that the OpenSSH server vulnerability (CVE-2024-6387) is present in Debian GNU/Linux 10 (buster)?
How can I get fixes for this version? Will t…
-
https://github.com/lflare/cve-2024-6387-poc
Affected versions of OpenSSH range from 8.5p1 to 9.8p1
Severity: critical.
-
### Request for information
CVE-2024-6387 (stylized as regreSSHion) is a Remote **Unauthenticated** Code Execution vulnerability in `sshd` in glibc-based Linux systems, discovered by [Qualys](https…
-
|Wazuh version|Component|Install type|Install method|Platform|
|---|---|---|---|---|
|4.8.0 | Vulnerability Detector | Manager | Packages (All in One) | Alma Linux 9.3 |
Hello there!
I was che…
-
Description: On July 1, 2024, a critical signal handler race condition vulnerability was disclosed in OpenSSH servers (sshd) on glibc-based Linux systems. This vulnerability, called RegreSSHion and tr…
-
Hello,
Can you confirm if OpenSSH version 1:8.4p1-5+deb11u1+fips used in the SONiC image is affected by CVE-2024-6387?
Thank you.
-
-
send_packet: Resource temporarily unavailable