<?xml version="1.0" encoding="UTF-8"?>
<VrdaData refvuldefversion="1.2" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://vrda.jpcert.or.jp" xsi:schemaLocation="http://vrda.jpcert.or.jp/feed/xsd/vrda_data.xsd">
  <VrdaDataProvider>
    <Name>JVN iPedia</Name>
    <URL>http://jvndb.jvn.jp</URL>
  </VrdaDataProvider>
  <VrdaDataSourceType>Advisory</VrdaDataSourceType>
  <Vulinfo lang="ja" revisionno="1" invalidated="false">
    <VulinfoID>JVNDB-2024-004050</VulinfoID>
    <VulinfoData>
      <Title>OpenBSD &#12398; OpenSSH &#31561;&#35079;&#25968;&#12505;&#12531;&#12480;&#12398;&#35069;&#21697;&#12395;&#12362;&#12369;&#12427;&#31478;&#21512;&#29366;&#24907;&#12395;&#38306;&#12377;&#12427;&#33030;&#24369;&#24615;</Title>
      <VulinfoDescription>
        <Overview>OpenBSD &#12398; OpenSSH &#31561;&#35079;&#25968;&#12505;&#12531;&#12480;&#12398;&#35069;&#21697;&#12395;&#12399;&#12289;&#31478;&#21512;&#29366;&#24907;&#12395;&#38306;&#12377;&#12427;&#33030;&#24369;&#24615;&#12364;&#23384;&#22312;&#12375;&#12414;&#12377;&#12290;</Overview>
      </VulinfoDescription>
      <Affected>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/a:netapp:e-series_santricity_os_controller</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/a:netapp:ontap_select_deploy_administration_utility</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/a:netapp:ontap_tools</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/a:openbsd:openssh</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/a:redhat:openshift_container_platform</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:amazon:linux_2023</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:canonical:ubuntu_linux</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:debian:debian_linux</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:freebsd:freebsd</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:netbsd:netbsd</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:redhat:enterprise_linux</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:redhat:enterprise_linux_eus</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:redhat:enterprise_linux_for_arm_64</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:redhat:enterprise_linux_for_arm_64_eus</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:redhat:enterprise_linux_for_ibm_z_systems</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:redhat:enterprise_linux_for_ibm_z_systems_eus</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:redhat:enterprise_linux_for_power_little_endian</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:redhat:enterprise_linux_for_power_little_endian_eus</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:redhat:enterprise_linux_server_aus</Lapt>
        </AffectedItem>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/o:suse:linux_enterprise_micro</Lapt>
        </AffectedItem>
      </Affected>
      <FactAnalysis>
      </FactAnalysis>
      <Related>
        <RelatedItem origin="jvnipedia" relationtype="self">
          <URL>https://jvndb.jvn.jp/ja/contents/2024/JVNDB-2024-004050.html</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="alternate">
          <Name>Common Vulnerabilities and Exposures (CVE)</Name>
          <VulinfoID>CVE-2024-6387</VulinfoID>
          <URL>https://www.cve.org/CVERecord?id=CVE-2024-6387</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="alternate">
          <Name>National Vulnerability Database (NVD)</Name>
          <VulinfoID>CVE-2024-6387</VulinfoID>
          <URL>https://nvd.nist.gov/vuln/detail/CVE-2024-6387</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>JVNDB</Name>
          <VulinfoID>CWE-362</VulinfoID>
          <Title>&#31478;&#21512;&#29366;&#24907;</Title>
          <URL>https://jvndb.jvn.jp/ja/cwe/CWE-362.html</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>security.netapp.com (ntap-20240701-0001)</VulinfoID>
          <URL>https://security.netapp.com/advisory/ntap-20240701-0001/</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.openwall.com (oss-security/2024/07/04/2)</VulinfoID>
          <URL>http://www.openwall.com/lists/oss-security/2024/07/04/2</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.splunk.com (cve-2024-6387-regresshion-vulnerability)</VulinfoID>
          <URL>https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>explore.alas.aws.amazon.com (CVE-2024-6387)</VulinfoID>
          <URL>https://explore.alas.aws.amazon.com/CVE-2024-6387.html</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>github.com (issues/87)</VulinfoID>
          <URL>https://github.com/rapier1/hpn-ssh/issues/87</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.openwall.com (oss-security/2024/07/03/1)</VulinfoID>
          <URL>http://www.openwall.com/lists/oss-security/2024/07/03/1</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>sig-security.rocky.page (CVE-2024-6387)</VulinfoID>
          <URL>https://sig-security.rocky.page/issues/CVE-2024-6387/</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>access.redhat.com (RHSA-2024:4312)</VulinfoID>
          <URL>https://access.redhat.com/errata/RHSA-2024:4312</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.suse.com (CVE-2024-6387)</VulinfoID>
          <URL>https://www.suse.com/security/cve/CVE-2024-6387.html</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>forum.vmssoftware.com (viewtopic.php?f=8&amp;t=9132)</VulinfoID>
          <URL>https://forum.vmssoftware.com/viewtopic.php?f=8&amp;t=9132</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>github.com (cve-2024-6387-poc)</VulinfoID>
          <URL>https://github.com/zgzhang/cve-2024-6387-poc</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.openwall.com (oss-security/2024/07/03/11)</VulinfoID>
          <URL>http://www.openwall.com/lists/oss-security/2024/07/03/11</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>stackdiary.com (openssh-race-condition-in-sshd-allows-remote-code-execution)</VulinfoID>
          <URL>https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>access.redhat.com (RHSA-2024:4340)</VulinfoID>
          <URL>https://access.redhat.com/errata/RHSA-2024:4340</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.theregister.com (regresshion_openssh)</VulinfoID>
          <URL>https://www.theregister.com/2024/07/01/regresshion_openssh/</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>ftp.netbsd.org (NetBSD-SA2024-002.txt.asc)</VulinfoID>
          <URL>https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>lists.mindrot.org (000158)</VulinfoID>
          <URL>https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.openwall.com (oss-security/2024/07/03/2)</VulinfoID>
          <URL>http://www.openwall.com/lists/oss-security/2024/07/03/2</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>ubuntu.com (CVE-2024-6387)</VulinfoID>
          <URL>https://ubuntu.com/security/CVE-2024-6387</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>access.redhat.com (CVE-2024-6387)</VulinfoID>
          <URL>https://access.redhat.com/security/cve/CVE-2024-6387</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>github.com (issues/629)</VulinfoID>
          <URL>https://github.com/AlmaLinux/updates/issues/629</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>lists.mindrot.org (041431)</VulinfoID>
          <URL>https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.openwall.com (oss-security/2024/07/03/3)</VulinfoID>
          <URL>http://www.openwall.com/lists/oss-security/2024/07/03/3</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>ubuntu.com (USN-6859-1)</VulinfoID>
          <URL>https://ubuntu.com/security/notices/USN-6859-1</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>archlinux.org (the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1)</VulinfoID>
          <URL>https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>github.com (issues/4379)</VulinfoID>
          <URL>https://github.com/Azure/AKS/issues/4379</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>news.ycombinator.com (40843778)</VulinfoID>
          <URL>https://news.ycombinator.com/item?id=40843778</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.openwall.com (oss-security/2024/07/03/4)</VulinfoID>
          <URL>http://www.openwall.com/lists/oss-security/2024/07/03/4</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.freebsd.org (FreeBSD-SA-24:04.openssh.asc)</VulinfoID>
          <URL>https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>arstechnica.com (regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux)</VulinfoID>
          <URL>https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>github.com (discussions/2248)</VulinfoID>
          <URL>https://github.com/PowerShell/Win32-OpenSSH/discussions/2248</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.openwall.com (oss-security/2024/07/01/12)</VulinfoID>
          <URL>http://www.openwall.com/lists/oss-security/2024/07/01/12</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>psirt.global.sonicwall.com (SNWLID-2024-0010)</VulinfoID>
          <URL>https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.openwall.com (oss-security/2024/07/03/5)</VulinfoID>
          <URL>http://www.openwall.com/lists/oss-security/2024/07/03/5</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.openssh.com (release-9.8)</VulinfoID>
          <URL>https://www.openssh.com/txt/release-9.8</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>blog.qualys.com (regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server)</VulinfoID>
          <URL>https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>github.com (issues/2249)</VulinfoID>
          <URL>https://github.com/PowerShell/Win32-OpenSSH/issues/2249</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>security-tracker.debian.org (CVE-2024-6387)</VulinfoID>
          <URL>https://security-tracker.debian.org/tracker/CVE-2024-6387</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.openwall.com (oss-security/2024/07/04/1)</VulinfoID>
          <URL>http://www.openwall.com/lists/oss-security/2024/07/04/1</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.qualys.com (regresshion.txt)</VulinfoID>
          <URL>https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>bugzilla.redhat.com (2294604)</VulinfoID>
          <URL>https://bugzilla.redhat.com/show_bug.cgi?id=2294604</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>github.com (issues/9555)</VulinfoID>
          <URL>https://github.com/microsoft/azurelinux/issues/9555</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.openwall.com (oss-security/2024/07/01/13)</VulinfoID>
          <URL>http://www.openwall.com/lists/oss-security/2024/07/01/13</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>github.com (issues/149)</VulinfoID>
          <URL>https://github.com/oracle/oracle-linux/issues/149</URL>
        </RelatedItem>
        <RelatedItem origin="other" relationtype="reference">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>www.openwall.com (oss-security/2024/07/02/1)</VulinfoID>
          <URL>http://www.openwall.com/lists/oss-security/2024/07/02/1</URL>
        </RelatedItem>
      </Related>
      <DateFirstPublished>2024-07-08T14:27:18+09:00</DateFirstPublished>
      <DateLastUpdated>2024-07-08T14:27:18+09:00</DateLastUpdated>
    </VulinfoData>
  </Vulinfo>
</VrdaData>
