Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-6387

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-01 Jul, 2024 | 12:37
Updated At-11 Dec, 2025 | 06:17
Rejected At-
Credits

Openssh: regresshion - race condition in ssh allows rce/dos

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:01 Jul, 2024 | 12:37
Updated At:11 Dec, 2025 | 06:17
Rejected At:
â–¼CVE Numbering Authority (CNA)
Openssh: regresshion - race condition in ssh allows rce/dos

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

Affected Products
Collection URL
https://www.openssh.com/
Package Name
OpenSSH
Repo
https://anongit.mindrot.org/openssh.git
Default Status
unaffected
Versions
Affected
  • From 8.5p1 through 9.7p1 (custom)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
openssh
CPEs
  • cpe:/a:redhat:enterprise_linux:9::appstream
  • cpe:/o:redhat:enterprise_linux:9::baseos
Default Status
affected
Versions
Unaffected
  • From 0:8.7p1-38.el9_4.1 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
openssh
CPEs
  • cpe:/a:redhat:enterprise_linux:9::appstream
  • cpe:/o:redhat:enterprise_linux:9::baseos
Default Status
affected
Versions
Unaffected
  • From 0:8.7p1-38.el9_4.1 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
openssh
CPEs
  • cpe:/a:redhat:rhel_e4s:9.0::appstream
  • cpe:/o:redhat:rhel_e4s:9.0::baseos
Default Status
affected
Versions
Unaffected
  • From 0:8.7p1-12.el9_0.1 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 9.2 Extended Update Support
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
openssh
CPEs
  • cpe:/o:redhat:rhel_eus:9.2::baseos
  • cpe:/a:redhat:rhel_eus:9.2::appstream
Default Status
affected
Versions
Unaffected
  • From 0:8.7p1-30.el9_2.4 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift Container Platform 4.13
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
rhcos
CPEs
  • cpe:/a:redhat:openshift:4.13::el9
  • cpe:/a:redhat:openshift:4.13::el8
Default Status
affected
Versions
Unaffected
  • From 413.92.202407091321-0 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift Container Platform 4.14
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
rhcos
CPEs
  • cpe:/a:redhat:openshift:4.14::el8
  • cpe:/a:redhat:openshift:4.14::el9
Default Status
affected
Versions
Unaffected
  • From 414.92.202407091253-0 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift Container Platform 4.15
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
rhcos
CPEs
  • cpe:/a:redhat:openshift:4.15::el8
  • cpe:/a:redhat:openshift:4.15::el9
Default Status
affected
Versions
Unaffected
  • From 415.92.202407091355-0 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat OpenShift Container Platform 4.16
Collection URL
https://catalog.redhat.com/software/containers/
Package Name
rhcos
CPEs
  • cpe:/a:redhat:openshift:4.16::el9
Default Status
affected
Versions
Unaffected
  • From 416.94.202407081958-0 before * (rpm)
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Ceph Storage 5
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
openssh
CPEs
  • cpe:/a:redhat:ceph_storage:5
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Ceph Storage 6
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
openssh
CPEs
  • cpe:/a:redhat:ceph_storage:6
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Ceph Storage 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
openssh
CPEs
  • cpe:/a:redhat:ceph_storage:7
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 10
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
openssh
CPEs
  • cpe:/o:redhat:enterprise_linux:10
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 6
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
openssh
CPEs
  • cpe:/o:redhat:enterprise_linux:6
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 7
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
openssh
CPEs
  • cpe:/o:redhat:enterprise_linux:7
Default Status
unaffected
Vendor
Red Hat, Inc.Red Hat
Product
Red Hat Enterprise Linux 8
Collection URL
https://access.redhat.com/downloads/content/package-browser/
Package Name
openssh
CPEs
  • cpe:/o:redhat:enterprise_linux:8
Default Status
unaffected
Problem Types
TypeCWE IDDescription
CWECWE-364Signal Handler Race Condition
Type: CWE
CWE ID: CWE-364
Description: Signal Handler Race Condition
Metrics
VersionBase scoreBase severityVector
3.18.1HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Red Hat severity rating
value:
Important
namespace:
https://access.redhat.com/security/updates/classification/
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

The below process can protect against a Remote Code Execution attack by disabling the LoginGraceTime parameter on Red Hat Enterprise Linux 9. However, the sshd server is still vulnerable to a Denial of Service if an attacker exhausts all the connections. 1) As root user, open the /etc/ssh/sshd_config 2) Add or edit the parameter configuration: ~~~ LoginGraceTime 0 ~~~ 3) Save and close the file 4) Restart the sshd daemon: ~~~ systemctl restart sshd.service ~~~ Setting LoginGraceTime to 0 disables the SSHD server's ability to drop connections if authentication is not completed within the specified timeout. If this mitigation is implemented, it is highly recommended to use a tool like 'fail2ban' alongside a firewall to monitor log files and manage connections appropriately. If any of the mitigations mentioned above is used, please note that the removal of LoginGraceTime parameter from sshd_config is not automatic when the updated package is installed.

Exploits

Credits

Red Hat would like to thank Qualys Threat Research Unit (TRU) (Qualys) for reporting this issue.
Timeline
EventDate
Reported to Red Hat.2024-06-27 00:00:00
Made public.2024-07-01 08:00:00
Event: Reported to Red Hat.
Date: 2024-06-27 00:00:00
Event: Made public.
Date: 2024-07-01 08:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://access.redhat.com/errata/RHSA-2024:4312
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:4340
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:4389
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:4469
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:4474
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:4479
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2024:4484
vendor-advisory
x_refsource_REDHAT
https://access.redhat.com/security/cve/CVE-2024-6387
vdb-entry
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=2294604
issue-tracking
x_refsource_REDHAT
https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
N/A
https://www.openssh.com/txt/release-9.8
N/A
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
N/A
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4312
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4340
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4389
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4469
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4474
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4479
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4484
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-6387
Resource:
vdb-entry
x_refsource_REDHAT
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2294604
Resource:
issue-tracking
x_refsource_REDHAT
Hyperlink: https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
Resource: N/A
Hyperlink: https://www.openssh.com/txt/release-9.8
Resource: N/A
Hyperlink: https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
Resource: N/A
â–¼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387
N/A
https://www.exploit-db.com/exploits/52269
N/A
https://packetstorm.news/files/id/190587/
N/A
http://www.openwall.com/lists/oss-security/2024/07/01/12
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/01/13
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/02/1
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/03/1
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/03/11
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/03/2
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/03/3
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/03/4
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/03/5
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/04/1
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/04/2
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/08/2
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/08/3
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/09/2
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/09/5
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/10/1
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/10/2
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/10/3
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/10/4
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/10/6
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/11/1
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/11/3
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/23/4
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/23/6
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/28/2
x_transferred
http://www.openwall.com/lists/oss-security/2024/07/28/3
x_transferred
https://access.redhat.com/errata/RHSA-2024:4312
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:4340
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:4389
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:4469
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:4474
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:4479
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/errata/RHSA-2024:4484
vendor-advisory
x_refsource_REDHAT
x_transferred
https://access.redhat.com/security/cve/CVE-2024-6387
vdb-entry
x_refsource_REDHAT
x_transferred
https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/
x_transferred
https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/
x_transferred
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=2294604
issue-tracking
x_refsource_REDHAT
x_transferred
https://explore.alas.aws.amazon.com/CVE-2024-6387.html
x_transferred
https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132
x_transferred
https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc
x_transferred
https://github.com/AlmaLinux/updates/issues/629
x_transferred
https://github.com/Azure/AKS/issues/4379
x_transferred
https://github.com/PowerShell/Win32-OpenSSH/discussions/2248
x_transferred
https://github.com/PowerShell/Win32-OpenSSH/issues/2249
x_transferred
https://github.com/microsoft/azurelinux/issues/9555
x_transferred
https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09
x_transferred
https://github.com/oracle/oracle-linux/issues/149
x_transferred
https://github.com/rapier1/hpn-ssh/issues/87
x_transferred
https://github.com/zgzhang/cve-2024-6387-poc
x_transferred
https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/
x_transferred
https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html
x_transferred
https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html
x_transferred
https://news.ycombinator.com/item?id=40843778
x_transferred
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010
x_transferred
https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
x_transferred
https://security-tracker.debian.org/tracker/CVE-2024-6387
x_transferred
https://security.netapp.com/advisory/ntap-20240701-0001/
x_transferred
https://sig-security.rocky.page/issues/CVE-2024-6387/
x_transferred
https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/
x_transferred
https://ubuntu.com/security/CVE-2024-6387
x_transferred
https://ubuntu.com/security/notices/USN-6859-1
x_transferred
https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do
x_transferred
https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100
x_transferred
https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc
x_transferred
https://www.openssh.com/txt/release-9.8
x_transferred
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
x_transferred
https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html
x_transferred
https://www.suse.com/security/cve/CVE-2024-6387.html
x_transferred
https://www.theregister.com/2024/07/01/regresshion_openssh/
x_transferred
https://support.apple.com/kb/HT214119
x_transferred
https://support.apple.com/kb/HT214118
x_transferred
https://support.apple.com/kb/HT214120
x_transferred
http://seclists.org/fulldisclosure/2024/Jul/20
x_transferred
http://seclists.org/fulldisclosure/2024/Jul/18
x_transferred
http://seclists.org/fulldisclosure/2024/Jul/19
x_transferred
Hyperlink: https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387
Resource: N/A
Hyperlink: https://www.exploit-db.com/exploits/52269
Resource: N/A
Hyperlink: https://packetstorm.news/files/id/190587/
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/01/12
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/01/13
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/02/1
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/03/1
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/03/11
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/03/2
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/03/3
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/03/4
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/03/5
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/04/1
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/04/2
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/08/2
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/08/3
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/09/2
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/09/5
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/10/1
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/10/2
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/10/3
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/10/4
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/10/6
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/11/1
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/11/3
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/23/4
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/23/6
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/28/2
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/28/3
Resource:
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4312
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4340
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4389
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4469
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4474
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4479
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4484
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-6387
Resource:
vdb-entry
x_refsource_REDHAT
x_transferred
Hyperlink: https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/
Resource:
x_transferred
Hyperlink: https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/
Resource:
x_transferred
Hyperlink: https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
Resource:
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2294604
Resource:
issue-tracking
x_refsource_REDHAT
x_transferred
Hyperlink: https://explore.alas.aws.amazon.com/CVE-2024-6387.html
Resource:
x_transferred
Hyperlink: https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132
Resource:
x_transferred
Hyperlink: https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc
Resource:
x_transferred
Hyperlink: https://github.com/AlmaLinux/updates/issues/629
Resource:
x_transferred
Hyperlink: https://github.com/Azure/AKS/issues/4379
Resource:
x_transferred
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/discussions/2248
Resource:
x_transferred
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/issues/2249
Resource:
x_transferred
Hyperlink: https://github.com/microsoft/azurelinux/issues/9555
Resource:
x_transferred
Hyperlink: https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09
Resource:
x_transferred
Hyperlink: https://github.com/oracle/oracle-linux/issues/149
Resource:
x_transferred
Hyperlink: https://github.com/rapier1/hpn-ssh/issues/87
Resource:
x_transferred
Hyperlink: https://github.com/zgzhang/cve-2024-6387-poc
Resource:
x_transferred
Hyperlink: https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/
Resource:
x_transferred
Hyperlink: https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html
Resource:
x_transferred
Hyperlink: https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html
Resource:
x_transferred
Hyperlink: https://news.ycombinator.com/item?id=40843778
Resource:
x_transferred
Hyperlink: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010
Resource:
x_transferred
Hyperlink: https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
Resource:
x_transferred
Hyperlink: https://security-tracker.debian.org/tracker/CVE-2024-6387
Resource:
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20240701-0001/
Resource:
x_transferred
Hyperlink: https://sig-security.rocky.page/issues/CVE-2024-6387/
Resource:
x_transferred
Hyperlink: https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/
Resource:
x_transferred
Hyperlink: https://ubuntu.com/security/CVE-2024-6387
Resource:
x_transferred
Hyperlink: https://ubuntu.com/security/notices/USN-6859-1
Resource:
x_transferred
Hyperlink: https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do
Resource:
x_transferred
Hyperlink: https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100
Resource:
x_transferred
Hyperlink: https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc
Resource:
x_transferred
Hyperlink: https://www.openssh.com/txt/release-9.8
Resource:
x_transferred
Hyperlink: https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
Resource:
x_transferred
Hyperlink: https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html
Resource:
x_transferred
Hyperlink: https://www.suse.com/security/cve/CVE-2024-6387.html
Resource:
x_transferred
Hyperlink: https://www.theregister.com/2024/07/01/regresshion_openssh/
Resource:
x_transferred
Hyperlink: https://support.apple.com/kb/HT214119
Resource:
x_transferred
Hyperlink: https://support.apple.com/kb/HT214118
Resource:
x_transferred
Hyperlink: https://support.apple.com/kb/HT214120
Resource:
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2024/Jul/20
Resource:
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2024/Jul/18
Resource:
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2024/Jul/19
Resource:
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:01 Jul, 2024 | 13:15
Updated At:30 Sep, 2025 | 13:52

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.1HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary3.18.1HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

SonicWall Inc.
sonicwall
>>sma_6200_firmware>>-
cpe:2.3:o:sonicwall:sma_6200_firmware:-:*:*:*:*:*:*:*
SonicWall Inc.
sonicwall
>>sma_6200>>-
cpe:2.3:h:sonicwall:sma_6200:-:*:*:*:*:*:*:*
SonicWall Inc.
sonicwall
>>sma_7200_firmware>>-
cpe:2.3:o:sonicwall:sma_7200_firmware:-:*:*:*:*:*:*:*
SonicWall Inc.
sonicwall
>>sma_7200>>-
cpe:2.3:h:sonicwall:sma_7200:-:*:*:*:*:*:*:*
Arista Networks, Inc.
arista
>>eos>>Versions from 4.32.0(inclusive) to 4.32.1f(inclusive)
cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>23.10
cpe:2.3:o:canonical:ubuntu_linux:23.10:*:*:*:*:*:*:*
Canonical Ltd.
canonical
>>ubuntu_linux>>24.04
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
almalinux
almalinux
>>almalinux>>9.0
cpe:2.3:o:almalinux:almalinux:9.0:-:*:*:*:*:*:*
SonicWall Inc.
sonicwall
>>sma_6210_firmware>>-
cpe:2.3:o:sonicwall:sma_6210_firmware:-:*:*:*:*:*:*:*
SonicWall Inc.
sonicwall
>>sma_6210>>-
cpe:2.3:h:sonicwall:sma_6210:-:*:*:*:*:*:*:*
SonicWall Inc.
sonicwall
>>sma_7210_firmware>>-
cpe:2.3:o:sonicwall:sma_7210_firmware:-:*:*:*:*:*:*:*
SonicWall Inc.
sonicwall
>>sma_7210>>-
cpe:2.3:h:sonicwall:sma_7210:-:*:*:*:*:*:*:*
SonicWall Inc.
sonicwall
>>sma_8200v_firmware>>-
cpe:2.3:o:sonicwall:sma_8200v_firmware:-:*:*:*:*:*:*:*
SonicWall Inc.
sonicwall
>>sma_8200v>>-
cpe:2.3:h:sonicwall:sma_8200v:-:*:*:*:*:*:*:*
SonicWall Inc.
sonicwall
>>sra_ex_7000_firmware>>-
cpe:2.3:o:sonicwall:sra_ex_7000_firmware:-:*:*:*:*:*:*:*
SonicWall Inc.
sonicwall
>>sra_ex_7000>>-
cpe:2.3:h:sonicwall:sra_ex_7000:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a1k_firmware>>-
cpe:2.3:o:netapp:a1k_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a1k>>-
cpe:2.3:h:netapp:a1k:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a70_firmware>>-
cpe:2.3:o:netapp:a70_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a70>>-
cpe:2.3:h:netapp:a70:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a90_firmware>>-
cpe:2.3:o:netapp:a90_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a90>>-
cpe:2.3:h:netapp:a90:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a700s_firmware>>-
cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a700s>>-
cpe:2.3:h:netapp:a700s:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>8300_firmware>>-
cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>8300>>-
cpe:2.3:h:netapp:8300:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>8700_firmware>>-
cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>8700>>-
cpe:2.3:h:netapp:8700:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a400_firmware>>-
cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a400>>-
cpe:2.3:h:netapp:a400:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>c400_firmware>>-
cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>c400>>-
cpe:2.3:h:netapp:c400:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a250_firmware>>-
cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a250>>-
cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>500f_firmware>>-
cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>500f>>-
cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>c250_firmware>>-
cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>c250>>-
cpe:2.3:h:netapp:c250:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a800_firmware>>-
cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a800>>-
cpe:2.3:h:netapp:a800:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>c800_firmware>>-
cpe:2.3:o:netapp:c800_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>c800>>-
cpe:2.3:h:netapp:c800:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a900_firmware>>-
cpe:2.3:o:netapp:a900_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a900>>-
cpe:2.3:h:netapp:a900:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a9500_firmware>>-
cpe:2.3:o:netapp:a9500_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a9500>>-
cpe:2.3:h:netapp:a9500:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>c190_firmware>>-
cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>c190>>-
cpe:2.3:h:netapp:c190:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a150_firmware>>-
cpe:2.3:o:netapp:a150_firmware:-:*:*:*:*:*:*:*
NetApp, Inc.
netapp
>>a150>>-
cpe:2.3:h:netapp:a150:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-364Secondarysecalert@redhat.com
CWE-362Primarynvd@nist.gov
CWE ID: CWE-364
Type: Secondary
Source: secalert@redhat.com
CWE ID: CWE-362
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://access.redhat.com/errata/RHSA-2024:4312secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4340secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4389secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4469secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4474secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4479secalert@redhat.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4484secalert@redhat.com
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2024-6387secalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2294604secalert@redhat.com
Third Party Advisory
https://santandersecurityresearch.github.io/blog/sshing_the_masses.htmlsecalert@redhat.com
Exploit
Third Party Advisory
https://www.openssh.com/txt/release-9.8secalert@redhat.com
Release Notes
Third Party Advisory
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txtsecalert@redhat.com
Exploit
Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/18af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://seclists.org/fulldisclosure/2024/Jul/19af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://seclists.org/fulldisclosure/2024/Jul/20af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/01/12af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/01/13af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/02/1af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/03/1af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/03/11af854a3a-2127-422b-91ae-364da2661108
Exploit
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/03/2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/03/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
http://www.openwall.com/lists/oss-security/2024/07/03/4af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/03/5af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/04/1af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/04/2af854a3a-2127-422b-91ae-364da2661108
Exploit
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/08/2af854a3a-2127-422b-91ae-364da2661108
Exploit
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/08/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/09/2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/09/5af854a3a-2127-422b-91ae-364da2661108
Exploit
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/10/1af854a3a-2127-422b-91ae-364da2661108
Exploit
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/10/2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/10/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/10/4af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/10/6af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/11/1af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/11/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/23/4af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/23/6af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/28/2af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2024/07/28/3af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://access.redhat.com/errata/RHSA-2024:4312af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4340af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4389af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4469af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4474af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4479af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2024:4484af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2024-6387af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
Third Party Advisory
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-serveraf854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2294604af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://explore.alas.aws.amazon.com/CVE-2024-6387.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.ascaf854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/AlmaLinux/updates/issues/629af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/Azure/AKS/issues/4379af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/PowerShell/Win32-OpenSSH/discussions/2248af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/PowerShell/Win32-OpenSSH/issues/2249af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/microsoft/azurelinux/issues/9555af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09af854a3a-2127-422b-91ae-364da2661108
Patch
https://github.com/oracle/oracle-linux/issues/149af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/rapier1/hpn-ssh/issues/87af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://github.com/zgzhang/cve-2024-6387-pocaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Release Notes
https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
https://news.ycombinator.com/item?id=40843778af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Patch
https://packetstorm.news/files/id/190587/af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://santandersecurityresearch.github.io/blog/sshing_the_masses.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2024-6387af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240701-0001/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://sig-security.rocky.page/issues/CVE-2024-6387/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
Third Party Advisory
https://support.apple.com/kb/HT214118af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.apple.com/kb/HT214119af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.apple.com/kb/HT214120af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://ubuntu.com/security/CVE-2024-6387af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://ubuntu.com/security/notices/USN-6859-1af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-doaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.exploit-db.com/exploits/52269af854a3a-2127-422b-91ae-364da2661108
Exploit
https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.ascaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.openssh.com/txt/release-9.8af854a3a-2127-422b-91ae-364da2661108
Release Notes
Third Party Advisory
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txtaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.suse.com/security/cve/CVE-2024-6387.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.theregister.com/2024/07/01/regresshion_openssh/af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
Third Party Advisory
https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387af854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4312
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4340
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4389
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4469
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4474
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4479
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4484
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-6387
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2294604
Source: secalert@redhat.com
Resource:
Third Party Advisory
Hyperlink: https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
Source: secalert@redhat.com
Resource:
Exploit
Third Party Advisory
Hyperlink: https://www.openssh.com/txt/release-9.8
Source: secalert@redhat.com
Resource:
Release Notes
Third Party Advisory
Hyperlink: https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
Source: secalert@redhat.com
Resource:
Exploit
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2024/Jul/18
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://seclists.org/fulldisclosure/2024/Jul/19
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://seclists.org/fulldisclosure/2024/Jul/20
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/01/12
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/01/13
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/02/1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/03/1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/03/11
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/03/2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/03/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/03/4
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/03/5
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/04/1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/04/2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/08/2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/08/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/09/2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/09/5
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/10/1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/10/2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/10/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/10/4
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/10/6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/11/1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/11/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/23/4
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/23/6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/28/2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: http://www.openwall.com/lists/oss-security/2024/07/28/3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4312
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4340
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4389
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4469
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4474
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4479
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2024:4484
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/security/cve/CVE-2024-6387
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Press/Media Coverage
Third Party Advisory
Hyperlink: https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Press/Media Coverage
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=2294604
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://explore.alas.aws.amazon.com/CVE-2024-6387.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Hyperlink: https://github.com/AlmaLinux/updates/issues/629
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/Azure/AKS/issues/4379
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/discussions/2248
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/PowerShell/Win32-OpenSSH/issues/2249
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/microsoft/azurelinux/issues/9555
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://github.com/oracle/oracle-linux/issues/149
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/rapier1/hpn-ssh/issues/87
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://github.com/zgzhang/cve-2024-6387-poc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Release Notes
Hyperlink: https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Hyperlink: https://news.ycombinator.com/item?id=40843778
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Patch
Hyperlink: https://packetstorm.news/files/id/190587/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://santandersecurityresearch.github.io/blog/sshing_the_masses.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
Hyperlink: https://security-tracker.debian.org/tracker/CVE-2024-6387
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20240701-0001/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://sig-security.rocky.page/issues/CVE-2024-6387/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Press/Media Coverage
Third Party Advisory
Hyperlink: https://support.apple.com/kb/HT214118
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.apple.com/kb/HT214119
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.apple.com/kb/HT214120
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://ubuntu.com/security/CVE-2024-6387
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://ubuntu.com/security/notices/USN-6859-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.exploit-db.com/exploits/52269
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.openssh.com/txt/release-9.8
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Release Notes
Third Party Advisory
Hyperlink: https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
Hyperlink: https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.suse.com/security/cve/CVE-2024-6387.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.theregister.com/2024/07/01/regresshion_openssh/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Press/Media Coverage
Third Party Advisory
Hyperlink: https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

755Records found

CVE-2019-12263
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.55% / 67.89%
||
7 Day CHG~0.00%
Published-09 Aug, 2019 | 18:10
Updated-04 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Wind River VxWorks 6.9.4 and vx7 has a Buffer Overflow in the TCP component (issue 4 of 4). There is an IPNET security vulnerability: TCP Urgent Pointer state confusion due to race condition.

Action-Not Available
Vendor-windriverbeldenn/aNetApp, Inc.Siemens AGSonicWall Inc.
Product-power_meter_9810_firmwarehirschmann_rsp20ruggedcom_win7025_firmwarehirschmann_ees25sonicoshirschmann_grs1030hirschmann_grs1142ruggedcom_win7018_firmwarehirschmann_rspe32hirschmann_grs1130garrettcom_magnum_dx940ehirschmann_rspe35hirschmann_eesx20hirschmann_rspe37ruggedcom_win7018power_meter_9410_firmwarehirschmann_grs1042siprotec_5_firmwareruggedcom_win7000ruggedcom_win7200hirschmann_rsp35garrettcom_magnum_dx940e_firmwaree-series_santricity_os_controllervxworkshirschmann_msp40hirschmann_octopus_os3hirschmann_rsp30hirschmann_dragon_mach4000hirschmann_dragon_mach4500hirschmann_msp32hirschmann_rsp25hirschmann_rail_switch_power_smarthirschmann_eesx30hirschmann_grs1020hirschmann_rail_switch_power_litehirschmann_eagle20hirschmann_eagle30hirschmann_hiosruggedcom_win7025hirschmann_rspe30hirschmann_eagle_oneruggedcom_win7200_firmwaresiprotec_5hirschmann_ees20hirschmann_red25power_meter_9410power_meter_9810ruggedcom_win7000_firmwarehirschmann_msp30hirschmann_grs1120n/a
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-32258
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-0.10% / 27.73%
||
7 Day CHG~0.00%
Published-24 Jul, 2023 | 15:19
Updated-05 Mar, 2025 | 18:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Session race condition remote code execution vulnerability

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_LOGOFF and SMB2_CLOSE commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.

Action-Not Available
Vendor-n/aNetApp, Inc.Fedora ProjectLinux Kernel Organization, IncRed Hat, Inc.
Product-linux_kernelh500sh410sh300sh700sRed Hat Enterprise Linux 8FedoraRed Hat Enterprise Linux 7Red Hat Enterprise Linux 9kernelRed Hat Enterprise Linux 6
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE ID-CWE-667
Improper Locking
CVE-2023-32250
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-9||CRITICAL
EPSS-0.10% / 28.43%
||
7 Day CHG~0.00%
Published-10 Jul, 2023 | 15:09
Updated-13 Feb, 2025 | 16:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Session race condition remote code execution vulnerability

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.

Action-Not Available
Vendor-n/aRed Hat, Inc.Linux Kernel Organization, IncNetApp, Inc.Fedora Project
Product-linux_kernelhci_storage_nodesh500shcih410sh300sh700sRed Hat Enterprise Linux 6kernelRed Hat Enterprise Linux 7FedoraRed Hat Enterprise Linux 9Red Hat Enterprise Linux 8
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2018-20836
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-3.83% / 88.17%
||
7 Day CHG~0.00%
Published-07 May, 2019 | 13:04
Updated-05 Aug, 2024 | 12:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.

Action-Not Available
Vendor-n/aopenSUSECanonical Ltd.Linux Kernel Organization, IncNetApp, Inc.Debian GNU/LinuxF5, Inc.
Product-virtual_storage_consoleubuntu_linuxdebian_linuxlinux_kernelstorage_replication_adapter_for_clustered_data_ontapsolidfire_\&_hci_management_nodeactive_iq_unified_managervasa_provider_for_clustered_data_ontaptraffix_signaling_delivery_controllersolidfire_\&_hci_storage_nodesnapprotecthci_compute_nodeleapn/a
CWE ID-CWE-416
Use After Free
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2024-7589
Matching Score-10
Assigner-FreeBSD
ShareView Details
Matching Score-10
Assigner-FreeBSD
CVSS Score-8.1||HIGH
EPSS-17.41% / 95.08%
||
7 Day CHG~0.00%
Published-11 Aug, 2024 | 03:15
Updated-16 Aug, 2024 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenSSH pre-authentication async signal safety issue

A signal handler in sshd(8) may call a logging function that is not async-signal-safe. The signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default). This signal handler executes in the context of the sshd(8)'s privileged code, which is not sandboxed and runs with full root privileges. This issue is another instance of the problem in CVE-2024-6387 addressed by FreeBSD-SA-24:04.openssh. The faulty code in this case is from the integration of blacklistd in OpenSSH in FreeBSD. As a result of calling functions that are not async-signal-safe in the privileged sshd(8) context, a race condition exists that a determined attacker may be able to exploit to allow an unauthenticated remote code execution as root.

Action-Not Available
Vendor-FreeBSD Foundation
Product-freebsdFreeBSDfreebsd
CWE ID-CWE-364
Signal Handler Race Condition
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2018-18559
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.84% / 74.68%
||
7 Day CHG~0.00%
Published-22 Oct, 2018 | 16:00
Updated-05 Aug, 2024 | 11:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Linux kernel through 4.19, a use-after-free can occur due to a race condition between fanout_add from setsockopt and bind on an AF_PACKET socket. This issue exists because of the 15fe076edea787807a7cdc168df832544b58eba6 incomplete fix for a race condition. The code mishandles a certain multithreaded case involving a packet_do_bind unregister action followed by a packet_notifier register action. Later, packet_release operates on only one of the two applicable linked lists. The attacker can achieve Program Counter control.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncRed Hat, Inc.
Product-enterprise_linux_serverlinux_kernelenterprise_linux_server_eusopenshift_container_platformenterprise_linux_server_ausenterprise_linux_workstationvirtualization_hostenterprise_linux_server_tusenterprise_linux_desktopn/a
CWE ID-CWE-416
Use After Free
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2020-7457
Matching Score-10
Assigner-FreeBSD
ShareView Details
Matching Score-10
Assigner-FreeBSD
CVSS Score-8.1||HIGH
EPSS-44.58% / 97.58%
||
7 Day CHG~0.00%
Published-09 Jul, 2020 | 13:46
Updated-04 Aug, 2024 | 09:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In FreeBSD 12.1-STABLE before r359565, 12.1-RELEASE before p7, 11.4-STABLE before r362975, 11.4-RELEASE before p1, and 11.3-RELEASE before p11, missing synchronization in the IPV6_2292PKTOPTIONS socket option set handler contained a race condition allowing a malicious application to modify memory after being freed, possibly resulting in code execution.

Action-Not Available
Vendor-n/aFreeBSD Foundation
Product-freebsdFreeBSD
CWE ID-CWE-416
Use After Free
CWE ID-CWE-662
Improper Synchronization
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2014-3701
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-0.46% / 64.41%
||
7 Day CHG~0.00%
Published-15 Dec, 2019 | 21:21
Updated-06 Aug, 2024 | 10:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

eDeploy has tmp file race condition flaws

Action-Not Available
Vendor-eDeployRed Hat, Inc.
Product-edeployjboss_enterprise_web_servereDeploy
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2006-4245
Matching Score-10
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-10
Assigner-Debian GNU/Linux
CVSS Score-8.1||HIGH
EPSS-0.34% / 56.36%
||
7 Day CHG~0.00%
Published-06 Nov, 2019 | 02:54
Updated-07 Aug, 2024 | 19:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

archivemail 0.6.2 uses temporary files insecurely leading to a possible race condition.

Action-Not Available
Vendor-archivemail_projectarchivemailDebian GNU/Linux
Product-archivemaildebian_linuxarchivemail
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2024-23235
Matching Score-10
Assigner-Apple Inc.
ShareView Details
Matching Score-10
Assigner-Apple Inc.
CVSS Score-8.1||HIGH
EPSS-0.05% / 15.73%
||
7 Day CHG~0.00%
Published-08 Mar, 2024 | 01:36
Updated-02 Apr, 2026 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition was addressed with additional validation. This issue is fixed in iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, tvOS 17.4, visionOS 1.1, watchOS 10.4. An app may be able to access user-sensitive data.

Action-Not Available
Vendor-Apple Inc.
Product-tvosvisionoswatchosmacosiphone_osipadosvisionOSmacOStvOSiOS and iPadOSwatchOStvosvisionoswatchosiosipad_osmacos
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2019-8162
Matching Score-10
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-10
Assigner-Adobe Systems Incorporated
CVSS Score-8.1||HIGH
EPSS-1.38% / 80.30%
||
7 Day CHG~0.00%
Published-17 Oct, 2019 | 20:11
Updated-04 Aug, 2024 | 21:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have a race condition vulnerability. Successful exploitation could lead to arbitrary code execution .

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationAdobe Inc.
Product-acrobat_dcmacoswindowsacrobat_reader_dcAdobe Acrobat and Reader
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2019-6974
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-7.92% / 92.05%
||
7 Day CHG~0.00%
Published-15 Feb, 2019 | 15:00
Updated-04 Aug, 2024 | 20:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.

Action-Not Available
Vendor-n/aCanonical Ltd.Red Hat, Inc.Linux Kernel Organization, IncDebian GNU/LinuxF5, Inc.
Product-enterprise_linux_serverubuntu_linuxbig-ip_webacceleratorbig-ip_application_acceleration_managerenterprise_linux_server_eusbig-ip_advanced_firewall_managerbig-ip_policy_enforcement_managerbig-ip_fraud_protection_serviceopenshift_container_platformenterprise_linux_server_ausenterprise_linuxbig-ip_global_traffic_managerbig-ip_local_traffic_managerbig-ip_analyticsbig-ip_application_security_managerbig-ip_edge_gatewaydebian_linuxlinux_kernelbig-ip_link_controllerenterprise_linux_workstationenterprise_linux_eusbig-ip_access_policy_managerenterprise_linux_server_tusenterprise_linux_desktopn/a
CWE ID-CWE-416
Use After Free
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2017-13905
Matching Score-10
Assigner-Apple Inc.
ShareView Details
Matching Score-10
Assigner-Apple Inc.
CVSS Score-8.1||HIGH
EPSS-0.61% / 69.72%
||
7 Day CHG~0.00%
Published-23 Dec, 2021 | 19:48
Updated-05 Aug, 2024 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition was addressed with additional validation. This issue is fixed in tvOS 11.2, iOS 11.2, macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan, watchOS 4.2. An application may be able to gain elevated privileges.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_oswatchostvosmac_os_xmacoswatchOStvOSmacOS
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2019-11815
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-1.18% / 78.77%
||
7 Day CHG+0.07%
Published-08 May, 2019 | 13:36
Updated-04 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.

Action-Not Available
Vendor-n/aNetApp, Inc.Canonical Ltd.Linux Kernel Organization, IncopenSUSEDebian GNU/Linux
Product-virtual_storage_consoleubuntu_linuxdebian_linuxlinux_kernelstorage_replication_adaptercn1610hci_storage_nodehci_management_nodeactive_iq_unified_managervasa_provider_for_clustered_data_ontapcn1610_firmwaresnapprotecthci_compute_nodesolidfireleapn/a
CWE ID-CWE-416
Use After Free
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-32257
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-0.11% / 30.02%
||
7 Day CHG~0.00%
Published-24 Jul, 2023 | 15:19
Updated-29 Jul, 2025 | 13:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Session race condition remote code execution vulnerability

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP and SMB2_LOGOFF commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.

Action-Not Available
Vendor-n/aRed Hat, Inc.Linux Kernel Organization, IncFedora ProjectNetApp, Inc.
Product-linux_kernelh500sh410ssolidfire_\&_hci_storage_nodeh300sh700sRed Hat Enterprise Linux 9Red Hat Enterprise Linux 6FedoraRed Hat Enterprise Linux 8Red Hat Enterprise Linux 7kernel
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CWE ID-CWE-667
Improper Locking
CVE-2023-32254
Matching Score-10
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-10
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 20.89%
||
7 Day CHG~0.00%
Published-10 Jul, 2023 | 15:11
Updated-13 Feb, 2025 | 16:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tree connection race condition remote code execution vulnerability

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.

Action-Not Available
Vendor-n/aRed Hat, Inc.Linux Kernel Organization, IncNetApp, Inc.Fedora Project
Product-linux_kernelh500shci_management_nodeh410sh300sh700sRed Hat Enterprise Linux 6kernelRed Hat Enterprise Linux 7FedoraRed Hat Enterprise Linux 9Red Hat Enterprise Linux 8
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2023-41915
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-1.03% / 77.40%
||
7 Day CHG~0.00%
Published-09 Sep, 2023 | 00:00
Updated-02 Aug, 2024 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenPMIx PMIx before 4.2.6 and 5.0.x before 5.0.1 allows attackers to obtain ownership of arbitrary files via a race condition during execution of library code with UID 0.

Action-Not Available
Vendor-openpmixn/aDebian GNU/LinuxFedora Project
Product-openpmixdebian_linuxfedoran/a
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2017-5035
Matching Score-10
Assigner-Chrome
ShareView Details
Matching Score-10
Assigner-Chrome
CVSS Score-8.1||HIGH
EPSS-0.43% / 62.92%
||
7 Day CHG~0.00%
Published-24 Apr, 2017 | 23:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Google Chrome prior to 57.0.2987.98 for Windows and Mac had a race condition, which could cause Chrome to display incorrect certificate information for a site.

Action-Not Available
Vendor-n/aDebian GNU/LinuxRed Hat, Inc.Apple Inc.Microsoft CorporationGoogle LLC
Product-chromeenterprise_linux_desktopenterprise_linux_workstationdebian_linuxenterprise_linux_servermacoswindowsGoogle Chrome prior to 57.0.2987.98 for Windows and Mac
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2024-1553
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-8.1||HIGH
EPSS-0.51% / 66.36%
||
7 Day CHG~0.00%
Published-20 Feb, 2024 | 13:21
Updated-27 Mar, 2025 | 14:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory safety bugs present in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.

Action-Not Available
Vendor-Debian GNU/LinuxMozilla Corporation
Product-firefoxthunderbirddebian_linuxFirefoxThunderbirdFirefox ESRdebian_linuxthunderbirdfirefoxfirefox_esr
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-12617
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-8.1||HIGH
EPSS-94.36% / 99.96%
||
7 Day CHG~0.00%
Published-03 Oct, 2017 | 15:00
Updated-22 Oct, 2025 | 00:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-15||Apply updates per vendor instructions.

When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Action-Not Available
Vendor-Oracle CorporationThe Apache Software FoundationCanonical Ltd.Debian GNU/LinuxNetApp, Inc.Red Hat, Inc.
Product-enterprise_linux_for_ibm_z_systemsinstantis_enterprisetrackretail_advanced_inventory_planningmicros_lucasenterprise_linux_serverretail_xstore_point_of_serviceubuntu_linuxtuxedo_system_and_applications_monitoroncommand_insightenterprise_linux_desktopretail_invoice_matchingretail_point-of-serviceretail_central_officeretail_eftlinkjboss_enterprise_web_server_text-only_advisoriesenterprise_linux_eus_compute_nodefusehospitality_guest_accessretail_convenience_and_fuel_pos_softwaredebian_linuxmicros_retail_xbri_loss_preventiontransportation_managementfinancial_services_analytical_applications_infrastructureenterprise_linux_for_ibm_z_systems_eusenterprise_linux_for_power_big_endianenterprise_linux_for_power_little_endian_eusretail_order_management_systemtomcatretail_returns_managemententerprise_manager_for_mysql_databaseenterprise_linux_eusretail_insightsretail_back_officeworkload_managerfmw_platformsnapcenterelemententerprise_linux_for_power_little_endianjboss_enterprise_application_platformmysql_enterprise_monitormanagement_packretail_order_brokerretail_store_inventory_managementhealth_sciences_empirica_inspectionsenterprise_linux_for_power_big_endian_eusagile_plmwebcenter_sitesoncommand_shiftretail_price_managementendeca_information_discovery_integratorjboss_enterprise_web_serverenterprise_linux_server_ausenterprise_linux_server_tusoncommand_workflow_automationoncommand_balanceenterprise_linux_workstationcommunications_instant_messaging_serveractive_iq_unified_managerApache TomcatTomcat
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2019-16255
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-1.16% / 78.59%
||
7 Day CHG~0.00%
Published-26 Nov, 2019 | 00:00
Updated-05 Aug, 2024 | 01:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.

Action-Not Available
Vendor-n/aOracle CorporationDebian GNU/LinuxRubyopenSUSE
Product-leapdebian_linuxrubygraalvmn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2017-12615
Matching Score-8
Assigner-Apache Software Foundation
ShareView Details
Matching Score-8
Assigner-Apache Software Foundation
CVSS Score-8.1||HIGH
EPSS-94.20% / 99.92%
||
7 Day CHG~0.00%
Published-19 Sep, 2017 | 13:00
Updated-22 Oct, 2025 | 00:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-15||Apply updates per vendor instructions.

When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.

Action-Not Available
Vendor-The Apache Software FoundationNetApp, Inc.Microsoft CorporationRed Hat, Inc.
Product-enterprise_linux_server_update_services_for_sap_solutionsenterprise_linux_for_ibm_z_systemsenterprise_linux_serverenterprise_linux_euswindowsenterprise_linux_for_power_little_endianenterprise_linux_desktop7-mode_transition_tooljboss_enterprise_web_server_text-only_advisoriesenterprise_linux_eus_compute_nodeenterprise_linux_for_power_big_endian_eusoncommand_shiftenterprise_linux_server_ausjboss_enterprise_web_serverenterprise_linux_for_power_little_endian_eusenterprise_linux_for_ibm_z_systems_eusenterprise_linux_for_power_big_endianenterprise_linux_server_tusoncommand_balanceenterprise_linux_for_scientific_computingenterprise_linux_workstationtomcatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsApache TomcatTomcat
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2017-11103
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-6.30% / 90.98%
||
7 Day CHG~0.00%
Published-13 Jul, 2017 | 13:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated.

Action-Not Available
Vendor-heimdal_projectn/aDebian GNU/LinuxApple Inc.SambaFreeBSD Foundation
Product-heimdaliphone_ossambadebian_linuxfreebsdmac_os_xn/a
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2022-48655
Matching Score-8
Assigner-kernel.org
ShareView Details
Matching Score-8
Assigner-kernel.org
CVSS Score-8.1||HIGH
EPSS-0.05% / 15.29%
||
7 Day CHG~0.00%
Published-28 Apr, 2024 | 13:01
Updated-04 May, 2025 | 08:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
firmware: arm_scmi: Harden accesses to the reset domains

In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Harden accesses to the reset domains Accessing reset domains descriptors by the index upon the SCMI drivers requests through the SCMI reset operations interface can potentially lead to out-of-bound violations if the SCMI driver misbehave. Add an internal consistency check before any such domains descriptors accesses.

Action-Not Available
Vendor-Linux Kernel Organization, IncDebian GNU/Linux
Product-debian_linuxlinux_kernelLinuxlinux_kernel
CWE ID-CWE-125
Out-of-bounds Read
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2017-1000256
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.90% / 75.76%
||
7 Day CHG-0.11%
Published-31 Oct, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.

Action-Not Available
Vendor-n/aRed Hat, Inc.Debian GNU/Linux
Product-debian_linuxlibvirtn/a
CWE ID-CWE-295
Improper Certificate Validation
CVE-2017-1000433
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-2.08% / 84.02%
||
7 Day CHG~0.00%
Published-02 Jan, 2018 | 23:00
Updated-05 Aug, 2024 | 22:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

pysaml2 version 4.4.0 and older accept any password when run with python optimizations enabled. This allows attackers to log in as any user without knowing their password.

Action-Not Available
Vendor-pysaml2_projectn/aDebian GNU/Linux
Product-pysaml2debian_linuxn/a
CWE ID-CWE-287
Improper Authentication
CVE-2016-9587
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.6||MEDIUM
EPSS-4.08% / 88.56%
||
7 Day CHG~0.00%
Published-24 Apr, 2018 | 16:00
Updated-06 Aug, 2024 | 02:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.

Action-Not Available
Vendor-ansibleunspecifiedRed Hat, Inc.
Product-openstackansibleAnsible
CWE ID-CWE-20
Improper Input Validation
CVE-2025-27363
Matching Score-8
Assigner-Meta Platforms, Inc.
ShareView Details
Matching Score-8
Assigner-Meta Platforms, Inc.
CVSS Score-8.1||HIGH
EPSS-63.44% / 98.41%
||
7 Day CHG~0.00%
Published-11 Mar, 2025 | 13:28
Updated-17 Apr, 2026 | 13:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-05-27||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.

Action-Not Available
Vendor-freetypeFreeTypeFreeTypeDebian GNU/Linux
Product-debian_linuxfreetypeFreeTypeFreeType
CWE ID-CWE-787
Out-of-bounds Write
CVE-2019-11243
Matching Score-8
Assigner-Kubernetes
ShareView Details
Matching Score-8
Assigner-Kubernetes
CVSS Score-3.1||LOW
EPSS-0.24% / 46.99%
||
7 Day CHG~0.00%
Published-22 Apr, 2019 | 14:54
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Kubernetes v1.12.0-v1.12.4 and v1.13.0, the rest.AnonymousClientConfig() method returns a copy of the provided config, with credentials removed (bearer token, username/password, and client certificate/key data). In the affected versions, rest.AnonymousClientConfig() did not effectively clear service account credentials loaded using rest.InClusterConfig()

Action-Not Available
Vendor-NetApp, Inc.Kubernetes
Product-kubernetestridentKubernetes
CWE ID-CWE-271
Privilege Dropping / Lowering Errors
CWE ID-CWE-212
Improper Removal of Sensitive Information Before Storage or Transfer
CVE-2019-10181
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.40% / 60.63%
||
7 Day CHG~0.00%
Published-31 Jul, 2019 | 21:56
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that in icedtea-web up to and including 1.7.2 and 1.8.2 executable code could be injected in a JAR file without compromising the signature verification. An attacker could use this flaw to inject code in a trusted JAR. The code would be executed inside the sandbox.

Action-Not Available
Vendor-icedtea-web_projectIcedTeaDebian GNU/LinuxopenSUSE
Product-icedtea-webdebian_linuxleapicedtea-web
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2019-1003049
Matching Score-8
Assigner-Jenkins Project
ShareView Details
Matching Score-8
Assigner-Jenkins Project
CVSS Score-8.1||HIGH
EPSS-0.47% / 64.81%
||
7 Day CHG~0.00%
Published-10 Apr, 2019 | 20:12
Updated-05 Aug, 2024 | 03:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Users who cached their CLI authentication before Jenkins was updated to 2.150.2 and newer, or 2.160 and newer, would remain authenticated in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, because the fix for CVE-2019-1003004 in these releases did not reject existing remoting-based CLI authentication caches.

Action-Not Available
Vendor-Oracle CorporationRed Hat, Inc.Jenkins
Product-communications_cloud_native_core_automated_test_suitejenkinsopenshift_container_platformJenkins
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2022-43599
Matching Score-8
Assigner-Talos
ShareView Details
Matching Score-8
Assigner-Talos
CVSS Score-8.1||HIGH
EPSS-0.61% / 69.73%
||
7 Day CHG~0.00%
Published-23 Dec, 2022 | 23:03
Updated-14 Apr, 2025 | 18:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `xmax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT8`

Action-Not Available
Vendor-openimageioOpenImageIO ProjectDebian GNU/Linux
Product-debian_linuxopenimageioOpenImageIO
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2022-43600
Matching Score-8
Assigner-Talos
ShareView Details
Matching Score-8
Assigner-Talos
CVSS Score-8.1||HIGH
EPSS-0.70% / 72.00%
||
7 Day CHG+0.03%
Published-23 Dec, 2022 | 23:03
Updated-14 Apr, 2025 | 18:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `xmax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT16`

Action-Not Available
Vendor-openimageioOpenImageIO ProjectDebian GNU/Linux
Product-debian_linuxopenimageioOpenImageIO
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2022-42915
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.47% / 64.45%
||
7 Day CHG-0.35%
Published-29 Oct, 2022 | 00:00
Updated-07 May, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

curl before 7.86.0 has a double free. If curl is told to use an HTTP proxy for a transfer with a non-HTTP(S) URL, it sets up the connection to the remote server by issuing a CONNECT request to the proxy, and then tunnels the rest of the protocol through. An HTTP proxy might refuse this request (HTTP proxies often only allow outgoing connections to specific port numbers, like 443 for HTTPS) and instead return a non-200 status code to the client. Due to flaws in the error/cleanup handling, this could trigger a double free in curl if one of the following schemes were used in the URL for the transfer: dict, gopher, gophers, ldap, ldaps, rtmp, rtmps, or telnet. The earliest affected version is 7.77.0.

Action-Not Available
Vendor-n/aCURLFedora ProjectNetApp, Inc.Apple Inc.Splunk LLC (Cisco Systems, Inc.)
Product-h410suniversal_forwarderh500s_firmwaremacosfedorah500scurlh700s_firmwareh410s_firmwareh300sh300s_firmwareontap_9h700sn/a
CWE ID-CWE-415
Double Free
CVE-2022-43602
Matching Score-8
Assigner-Talos
ShareView Details
Matching Score-8
Assigner-Talos
CVSS Score-8.1||HIGH
EPSS-0.63% / 70.26%
||
7 Day CHG~0.00%
Published-23 Dec, 2022 | 23:03
Updated-14 Apr, 2025 | 18:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `ymax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT8`

Action-Not Available
Vendor-openimageioOpenImageIO ProjectDebian GNU/Linux
Product-debian_linuxopenimageioOpenImageIO
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2022-43548
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-8.1||HIGH
EPSS-0.56% / 68.50%
||
7 Day CHG~0.00%
Published-05 Dec, 2022 | 00:00
Updated-30 Apr, 2025 | 05:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A OS Command Injection vulnerability exists in Node.js versions <14.21.1, <16.18.1, <18.12.1, <19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.

Action-Not Available
Vendor-Node.js (OpenJS Foundation)Debian GNU/Linux
Product-debian_linuxnode.jsNode
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-43598
Matching Score-8
Assigner-Talos
ShareView Details
Matching Score-8
Assigner-Talos
CVSS Score-8.1||HIGH
EPSS-0.38% / 59.28%
||
7 Day CHG+0.02%
Published-23 Dec, 2022 | 23:03
Updated-14 Apr, 2025 | 20:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple memory corruption vulnerabilities exist in the IFFOutput alignment padding functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to arbitrary code execution. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `m_spec.format` is `TypeDesc::UINT16`.

Action-Not Available
Vendor-openimageioOpenImageIO ProjectDebian GNU/Linux
Product-debian_linuxopenimageioOpenImageIO
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CVE-2022-43601
Matching Score-8
Assigner-Talos
ShareView Details
Matching Score-8
Assigner-Talos
CVSS Score-8.1||HIGH
EPSS-0.70% / 72.00%
||
7 Day CHG+0.03%
Published-23 Dec, 2022 | 23:03
Updated-14 Apr, 2025 | 18:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `ymax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT16`

Action-Not Available
Vendor-openimageioOpenImageIO ProjectDebian GNU/Linux
Product-debian_linuxopenimageioOpenImageIO
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2022-43597
Matching Score-8
Assigner-Talos
ShareView Details
Matching Score-8
Assigner-Talos
CVSS Score-8.1||HIGH
EPSS-0.45% / 63.85%
||
7 Day CHG~0.00%
Published-23 Dec, 2022 | 23:03
Updated-15 Apr, 2025 | 13:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple memory corruption vulnerabilities exist in the IFFOutput alignment padding functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to arbitrary code execution. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `m_spec.format` is `TypeDesc::UINT8`.

Action-Not Available
Vendor-openimageioOpenImageIO ProjectDebian GNU/Linux
Product-debian_linuxopenimageioOpenImageIO
CWE ID-CWE-122
Heap-based Buffer Overflow
CVE-2022-41828
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-9.64% / 92.91%
||
7 Day CHG~0.00%
Published-29 Sep, 2022 | 00:00
Updated-20 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Amazon AWS Redshift JDBC Driver (aka amazon-redshift-jdbc-driver or redshift-jdbc42) before 2.1.0.8, the Object Factory does not check the class type when instantiating an object from a class name.

Action-Not Available
Vendor-amazonn/a
Product-amazon_web_services_redshift_java_database_connectivity_drivern/a
CWE ID-CWE-704
Incorrect Type Conversion or Cast
CVE-2022-41981
Matching Score-8
Assigner-Talos
ShareView Details
Matching Score-8
Assigner-Talos
CVSS Score-8.1||HIGH
EPSS-0.37% / 58.94%
||
7 Day CHG+0.05%
Published-23 Dec, 2022 | 23:03
Updated-14 Apr, 2025 | 18:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A stack-based buffer overflow vulnerability exists in the TGA file format parser of OpenImageIO v2.3.19.0. A specially-crafted targa file can lead to out of bounds read and write on the process stack, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

Action-Not Available
Vendor-openimageioOpenImageIO ProjectDebian GNU/Linux
Product-debian_linuxopenimageioOpenImageIO
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2022-40674
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-1.09% / 77.95%
||
7 Day CHG~0.00%
Published-14 Sep, 2022 | 00:00
Updated-30 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.

Action-Not Available
Vendor-libexpat_projectn/aDebian GNU/LinuxFedora Project
Product-fedoralibexpatdebian_linuxn/a
CWE ID-CWE-416
Use After Free
CVE-2023-4853
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-0.46% / 63.87%
||
7 Day CHG~0.00%
Published-20 Sep, 2023 | 09:47
Updated-07 Nov, 2025 | 10:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Quarkus: http security policy bypass

A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.

Action-Not Available
Vendor-quarkusRed Hat, Inc.
Product-jboss_middleware_text-only_advisoriesintegration_service_registryintegration_camel_kbuild_of_optaplannerquarkusprocess_automation_manageropenshift_container_platformenterprise_linuxjboss_middlewareopenshift_serverlessbuild_of_quarkusdecision_managerintegration_camel_quarkusRHINT Service Registry 2.5.4 GARed Hat Camel Extensions for Quarkus 2.13.3-1Red Hat OpenShift Serverless 1.30RHINT Camel-K-1.10.2Red Hat build of Quarkus 2.13.8.SP2Red Hat Process Automation 7RHEL-8 based Middleware ContainersRed Hat build of OptaPlanner 8RHPAM 7.13.4 asyncOpenshift Serverless 1 on RHEL 8
CWE ID-CWE-148
Improper Neutralization of Input Leaders
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-37966
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-8.1||HIGH
EPSS-1.38% / 80.29%
||
7 Day CHG~0.00%
Published-09 Nov, 2022 | 00:00
Updated-02 Jan, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability

Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability

Action-Not Available
Vendor-SambaMicrosoft CorporationNetApp, Inc.Fedora Project
Product-management_services_for_element_softwarewindows_server_2016windows_server_2012sambamanagement_services_for_netapp_hcifedorawindows_server_2022windows_server_2019windows_server_2008Windows Server 2022Windows Server 2008 R2 Service Pack 1Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2012 R2Windows Server 2016 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2012Windows Server 2012 (Server Core installation)Windows Server 2019Windows Server 2012 R2 (Server Core installation)Windows Server 2016
CVE-2021-25216
Matching Score-8
Assigner-Internet Systems Consortium (ISC)
ShareView Details
Matching Score-8
Assigner-Internet Systems Consortium (ISC)
CVSS Score-8.1||HIGH
EPSS-27.74% / 96.46%
||
7 Day CHG~0.00%
Published-29 Apr, 2021 | 00:55
Updated-16 Sep, 2024 | 22:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
A second vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack

In BIND 9.5.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.11.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch, BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting values for the tkey-gssapi-keytab or tkey-gssapi-credential configuration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built: For named binaries compiled for 64-bit platforms, this flaw can be used to trigger a buffer over-read, leading to a server crash. For named binaries compiled for 32-bit platforms, this flaw can be used to trigger a server crash due to a buffer overflow and possibly also to achieve remote code execution. We have determined that standard SPNEGO implementations are available in the MIT and Heimdal Kerberos libraries, which support a broad range of operating systems, rendering the ISC implementation unnecessary and obsolete. Therefore, to reduce the attack surface for BIND users, we will be removing the ISC SPNEGO implementation in the April releases of BIND 9.11 and 9.16 (it had already been dropped from BIND 9.17). We would not normally remove something from a stable ESV (Extended Support Version) of BIND, but since system libraries can replace the ISC SPNEGO implementation, we have made an exception in this case for reasons of stability and security.

Action-Not Available
Vendor-NetApp, Inc.Debian GNU/LinuxSiemens AGInternet Systems Consortium, Inc.
Product-aff_500f_firmwareh300eh500scloud_backuph300s_firmwareactive_iq_unified_managerh410sh300ssinec_infrastructure_network_servicesh300e_firmwaredebian_linuxh500eh410s_firmwareh700s_firmwareh500s_firmwareh500e_firmwareaff_a250aff_500fh700ebindh700e_firmwareh700saff_a250_firmwareBIND9
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-23214
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-0.22% / 45.25%
||
7 Day CHG~0.00%
Published-04 Mar, 2022 | 00:00
Updated-03 Aug, 2024 | 19:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.

Action-Not Available
Vendor-n/aThe PostgreSQL Global Development GroupFedora ProjectRed Hat, Inc.
Product-software_collectionsfedorapostgresqlenterprise_linuxenterprise_linux_for_ibm_z_systemsenterprise_linux_for_power_little_endianpostgresql
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2016-5421
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-1.30% / 79.72%
||
7 Day CHG~0.00%
Published-10 Aug, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.

Action-Not Available
Vendor-n/aopenSUSEFedora ProjectDebian GNU/LinuxCanonical Ltd.CURL
Product-libcurlleapfedoraopensuseubuntu_linuxdebian_linuxn/a
CWE ID-CWE-416
Use After Free
CVE-2025-2291
Matching Score-8
Assigner-PostgreSQL
ShareView Details
Matching Score-8
Assigner-PostgreSQL
CVSS Score-8.1||HIGH
EPSS-0.30% / 53.57%
||
7 Day CHG~0.00%
Published-16 Apr, 2025 | 18:00
Updated-08 Dec, 2025 | 18:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PgBouncer default auth_query does not take Postgres password expiry into account

Password can be used past expiry in PgBouncer due to auth_query not taking into account Postgres its VALID UNTIL value, which allows an attacker to log in with an already expired password

Action-Not Available
Vendor-pgbouncern/aDebian GNU/Linux
Product-pgbouncerdebian_linuxPgBouncer
CWE ID-CWE-324
Use of a Key Past its Expiration Date
CVE-2022-38023
Matching Score-8
Assigner-Microsoft Corporation
ShareView Details
Matching Score-8
Assigner-Microsoft Corporation
CVSS Score-8.1||HIGH
EPSS-0.48% / 65.15%
||
7 Day CHG+0.13%
Published-09 Nov, 2022 | 00:00
Updated-02 Jan, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Netlogon RPC Elevation of Privilege Vulnerability

Netlogon RPC Elevation of Privilege Vulnerability

Action-Not Available
Vendor-SambaMicrosoft CorporationNetApp, Inc.Fedora Project
Product-management_services_for_element_softwarewindows_server_2016windows_server_2012sambamanagement_services_for_netapp_hcifedorawindows_server_2022windows_server_2019windows_server_2008Windows Server 2022Windows Server 2008 R2 Service Pack 1Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2012 R2Windows Server 2016 (Server Core installation)Windows Server 2008 Service Pack 2Windows Server 2012Windows Server 2012 (Server Core installation)Windows Server 2019Windows Server 2012 R2 (Server Core installation)Windows Server 2016
CVE-2021-22901
Matching Score-8
Assigner-HackerOne
ShareView Details
Matching Score-8
Assigner-HackerOne
CVSS Score-8.1||HIGH
EPSS-0.34% / 57.06%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 15:49
Updated-03 Aug, 2024 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.

Action-Not Available
Vendor-n/aNetApp, Inc.Oracle CorporationSplunk LLC (Cisco Systems, Inc.)CURLSiemens AG
Product-communications_cloud_native_core_network_function_cloud_native_environmentcloud_backupsolidfire_\&_hci_management_nodeh300s_firmwareh410scurlhci_compute_nodeh300ssnapcenterh300e_firmwaresinec_infrastructure_network_servicesessbaseh500eh500s_firmwareh500e_firmwarecommunications_cloud_native_core_binding_support_functionh700ehci_compute_node_firmwareoncommand_insightcommunications_cloud_native_core_service_communication_proxyh300ecommunications_cloud_native_core_network_slice_selection_functionh500scommunications_cloud_native_core_network_repository_functionactive_iq_unified_manageroncommand_workflow_automationuniversal_forwarderh410s_firmwareh700s_firmwaresolidfire\,_enterprise_sds_\&_hci_storage_nodeh700e_firmwaresolidfire_baseboard_management_controller_firmwareh700smysql_serverhttps://github.com/curl/curl
CWE ID-CWE-416
Use After Free
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 15
  • 16
  • Next
Details not found