High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2024-6387
HighVulnerability Description
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Known Affected Software
260 configuration(s) from 13 vendor(s)
cpe:2.3:o:almalinux:almalinux:9.0:-:*:*:*:*:*:*
cpe:2.3:o:amazon:amazon_linux:2023.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.6.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:14.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:14.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.6.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.7.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.7.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:14.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.6.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.6.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:14.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.6.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.6.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:14.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.6.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:14.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.6.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.6.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.6.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.7.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.7.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.6.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:14.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.6.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:14.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.6.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.6.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:14.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.6.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.7.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.6.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:13.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:12.3.1:*:*:*:*:*:*:*
cpe:2.3:o:arista:eos:4.32.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:23.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:22.10:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.3:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:13.2:p12:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.1:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.0:p10:*:*:*:*:*:*
cpe:2.3:o:netapp:a900_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:c400_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.2:-:*:*:*:*:*:*
cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:a1k_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.2:*:*:*:*:*:*:*
cpe:2.3:o:netapp:fas2820_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:a9500_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.3r2:*:*:*:*:*:*:*
cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40.5:*:*:*:*:*:*:*
cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.3:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.1:*:*:*:*:*:*:*
cpe:2.3:o:netapp:a70_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.0:*:*:*:*:*:*:*
cpe:2.3:o:netapp:a90_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.60:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30.5r3:*:*:*:*:*:*:*
cpe:2.3:o:netapp:c800_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:c250_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.40:*:*:*:*:*:*:*
cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.25:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.20:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.30:*:*:*:*:*:*:*
cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:a150_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.50.1:*:*:*:*:*:*:*
cpe:2.3:a:netapp:e-series_santricity_os_controller:11.70.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:2.1.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:5.0.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:0.8:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:9.0:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:4.0.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:4.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:4.0:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:3.0.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:3.0:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:7.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:9.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:9.4:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:9.3:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:7.0:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:9.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:10.0:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:5.0.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:5.0:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:3.99.15:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:3.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:0.9:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.6.1:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.2.2:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:8.9:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:4.4:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.6:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.2.3:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.7.1:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:8.6:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.7:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.8:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.4:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.1:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.2.2:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.2.0:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.4:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.5:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.2.3:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:8.5:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:4.2:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.3.0:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.3:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.2:p1:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.9.9:p2:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0.2:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.1:p1:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:8.7:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:4.0:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.1:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.9:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.1:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.5.2:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:4.1:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.6:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.3:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.3:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.5:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.1.1:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.8:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.9:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.5.1:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.9.1:p1:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:8.8:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.3:p2:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.2:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.7:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.8.1:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.5:*:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:2.1.0:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.0:p1:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:3.0:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:4.3:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.5:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_6200_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sra_ex_7000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_7200_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_6210_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_7210_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_8200v_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_micro:6.0:*:*:*:*:-:*:*
2024-Jul-CVE-2024-6387
CVE-2024-6387: RedHat Openssh: CVE-2024-6387 Remote Code Execution Due To A Race Condition In Signal Handling
References & Resources
-
https://access.redhat.com/errata/RHSA-2024:4312secalert@redhat.com Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:4340secalert@redhat.com Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:4389secalert@redhat.com Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:4469secalert@redhat.com Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:4474secalert@redhat.com Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:4479secalert@redhat.com Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:4484secalert@redhat.com Third Party Advisory
-
https://access.redhat.com/security/cve/CVE-2024-6387secalert@redhat.com Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=2294604secalert@redhat.com Third Party Advisory
-
https://santandersecurityresearch.github.io/blog/sshing_the_masses.htmlsecalert@redhat.com Exploit Third Party Advisory
-
https://www.openssh.com/txt/release-9.8secalert@redhat.com Release Notes Third Party Advisory
-
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txtsecalert@redhat.com Exploit Third Party Advisory
-
http://seclists.org/fulldisclosure/2024/Jul/18af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://seclists.org/fulldisclosure/2024/Jul/19af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://seclists.org/fulldisclosure/2024/Jul/20af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/01/12af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/01/13af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/02/1af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/03/1af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/03/11af854a3a-2127-422b-91ae-364da2661108 Exploit Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/03/2af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/03/3af854a3a-2127-422b-91ae-364da2661108 Mailing List Patch
-
http://www.openwall.com/lists/oss-security/2024/07/03/4af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/03/5af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/04/1af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/04/2af854a3a-2127-422b-91ae-364da2661108 Exploit Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/08/2af854a3a-2127-422b-91ae-364da2661108 Exploit Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/08/3af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/09/2af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/09/5af854a3a-2127-422b-91ae-364da2661108 Exploit Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/10/1af854a3a-2127-422b-91ae-364da2661108 Exploit Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/10/2af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/10/3af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/10/4af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/10/6af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/11/1af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/11/3af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/23/4af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/23/6af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/28/2af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
http://www.openwall.com/lists/oss-security/2024/07/28/3af854a3a-2127-422b-91ae-364da2661108 Mailing List
-
https://access.redhat.com/errata/RHSA-2024:4312af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:4340af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:4389af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:4469af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:4474af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:4479af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2024:4484af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://access.redhat.com/security/cve/CVE-2024-6387af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/af854a3a-2127-422b-91ae-364da2661108 Press/Media Coverage Third Party Advisory
-
https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-serveraf854a3a-2127-422b-91ae-364da2661108 Press/Media Coverage Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=2294604af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://explore.alas.aws.amazon.com/CVE-2024-6387.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
-
https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.ascaf854a3a-2127-422b-91ae-364da2661108 Release Notes
-
https://github.com/AlmaLinux/updates/issues/629af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
-
https://github.com/Azure/AKS/issues/4379af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
-
https://github.com/PowerShell/Win32-OpenSSH/discussions/2248af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
-
https://github.com/PowerShell/Win32-OpenSSH/issues/2249af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
-
https://github.com/microsoft/azurelinux/issues/9555af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
-
https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09af854a3a-2127-422b-91ae-364da2661108 Patch
-
https://github.com/oracle/oracle-linux/issues/149af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
-
https://github.com/rapier1/hpn-ssh/issues/87af854a3a-2127-422b-91ae-364da2661108 Issue Tracking
-
https://github.com/zgzhang/cve-2024-6387-pocaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Release Notes
-
https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Patch
-
https://news.ycombinator.com/item?id=40843778af854a3a-2127-422b-91ae-364da2661108 Issue Tracking Patch
-
https://packetstorm.news/files/id/190587/af854a3a-2127-422b-91ae-364da2661108 Broken Link
-
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://santandersecurityresearch.github.io/blog/sshing_the_masses.htmlaf854a3a-2127-422b-91ae-364da2661108 Exploit Third Party Advisory
-
https://security-tracker.debian.org/tracker/CVE-2024-6387af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20240701-0001/af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://sig-security.rocky.page/issues/CVE-2024-6387/af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/af854a3a-2127-422b-91ae-364da2661108 Press/Media Coverage Third Party Advisory
-
https://support.apple.com/kb/HT214118af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://support.apple.com/kb/HT214119af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://support.apple.com/kb/HT214120af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://ubuntu.com/security/CVE-2024-6387af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://ubuntu.com/security/notices/USN-6859-1af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-doaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://www.exploit-db.com/exploits/52269af854a3a-2127-422b-91ae-364da2661108 Exploit
-
https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.ascaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://www.openssh.com/txt/release-9.8af854a3a-2127-422b-91ae-364da2661108 Release Notes Third Party Advisory
-
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txtaf854a3a-2127-422b-91ae-364da2661108 Exploit Third Party Advisory
-
https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://www.suse.com/security/cve/CVE-2024-6387.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://www.theregister.com/2024/07/01/regresshion_openssh/af854a3a-2127-422b-91ae-364da2661108 Press/Media Coverage Third Party Advisory
-
https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387af854a3a-2127-422b-91ae-364da2661108 Exploit Third Party Advisory
Severity Details
Weakness Type (CWE)
Signal Handler Race Condition
- Description
- The product uses a signal handler that introduces a race condition.
- Exploit Likelihood
- Medium
- Typical Severity
- High
- Abstraction Level
- Base
Key Information
- Published Date
- July 01, 2024
