Vulnerabilites related to Red Hat - Red Hat Ceph Storage 6
cve-2024-6387
Vulnerability from cvelistv5
Published
2024-07-01 12:37
Modified
2024-11-24 17:19
Severity ?
EPSS score ?
Summary
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
References
▼ | URL | Tags |
---|---|---|
https://access.redhat.com/errata/RHSA-2024:4312 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:4340 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:4389 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:4469 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:4474 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:4479 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2024:4484 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/security/cve/CVE-2024-6387 | vdb-entry, x_refsource_REDHAT | |
https://bugzilla.redhat.com/show_bug.cgi?id=2294604 | issue-tracking, x_refsource_REDHAT | |
https://santandersecurityresearch.github.io/blog/sshing_the_masses.html | ||
https://www.openssh.com/txt/release-9.8 | ||
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ |
Version: 8.5p1 < |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-6387", options: [ { Exploitation: "poc", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-07-02T13:18:34.695298Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-07-02T13:18:46.662Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-19T07:47:51.801Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/01/12", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/01/13", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/02/1", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/03/1", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/03/11", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/03/2", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/03/3", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/03/4", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/03/5", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/04/1", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/04/2", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/08/2", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/08/3", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/09/2", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/09/5", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/10/1", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/10/2", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/10/3", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/10/4", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/10/6", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/11/1", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/11/3", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/23/4", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/23/6", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/28/2", }, { tags: [ "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2024/07/28/3", }, { name: "RHSA-2024:4312", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2024:4312", }, { name: "RHSA-2024:4340", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2024:4340", }, { name: "RHSA-2024:4389", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2024:4389", }, { name: "RHSA-2024:4469", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2024:4469", }, { name: "RHSA-2024:4474", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2024:4474", }, { name: "RHSA-2024:4479", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2024:4479", }, { name: "RHSA-2024:4484", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2024:4484", }, { tags: [ "vdb-entry", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/security/cve/CVE-2024-6387", }, { tags: [ "x_transferred", ], url: "https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/", }, { tags: [ "x_transferred", ], url: "https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/", }, { tags: [ "x_transferred", ], url: "https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server", }, { name: "RHBZ#2294604", tags: [ "issue-tracking", "x_refsource_REDHAT", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=2294604", }, { tags: [ "x_transferred", ], url: "https://explore.alas.aws.amazon.com/CVE-2024-6387.html", }, { tags: [ "x_transferred", ], url: "https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132", }, { tags: [ "x_transferred", ], url: "https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc", }, { tags: [ "x_transferred", ], url: "https://github.com/AlmaLinux/updates/issues/629", }, { tags: [ "x_transferred", ], url: "https://github.com/Azure/AKS/issues/4379", }, { tags: [ "x_transferred", ], url: "https://github.com/PowerShell/Win32-OpenSSH/discussions/2248", }, { tags: [ "x_transferred", ], url: "https://github.com/PowerShell/Win32-OpenSSH/issues/2249", }, { tags: [ "x_transferred", ], url: "https://github.com/microsoft/azurelinux/issues/9555", }, { tags: [ "x_transferred", ], url: "https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09", }, { tags: [ "x_transferred", ], url: "https://github.com/oracle/oracle-linux/issues/149", }, { tags: [ "x_transferred", ], url: "https://github.com/rapier1/hpn-ssh/issues/87", }, { tags: [ "x_transferred", ], url: "https://github.com/zgzhang/cve-2024-6387-poc", }, { tags: [ "x_transferred", ], url: "https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/", }, { tags: [ "x_transferred", ], url: "https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html", }, { tags: [ "x_transferred", ], url: "https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html", }, { tags: [ "x_transferred", ], url: "https://news.ycombinator.com/item?id=40843778", }, { tags: [ "x_transferred", ], url: "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010", }, { tags: [ "x_transferred", ], url: "https://santandersecurityresearch.github.io/blog/sshing_the_masses.html", }, { tags: [ "x_transferred", ], url: "https://security-tracker.debian.org/tracker/CVE-2024-6387", }, { tags: [ "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20240701-0001/", }, { tags: [ "x_transferred", ], url: "https://sig-security.rocky.page/issues/CVE-2024-6387/", }, { tags: [ "x_transferred", ], url: "https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/", }, { tags: [ "x_transferred", ], url: "https://ubuntu.com/security/CVE-2024-6387", }, { tags: [ "x_transferred", ], url: "https://ubuntu.com/security/notices/USN-6859-1", }, { tags: [ "x_transferred", ], url: "https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100", }, { tags: [ "x_transferred", ], url: "https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc", }, { tags: [ "x_transferred", ], url: "https://www.openssh.com/txt/release-9.8", }, { tags: [ "x_transferred", ], url: "https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt", }, { tags: [ "x_transferred", ], url: "https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html", }, { tags: [ "x_transferred", ], url: "https://www.suse.com/security/cve/CVE-2024-6387.html", }, { tags: [ "x_transferred", ], url: "https://www.theregister.com/2024/07/01/regresshion_openssh/", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT214119", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT214118", }, { tags: [ "x_transferred", ], url: "https://support.apple.com/kb/HT214120", }, { tags: [ "x_transferred", ], url: "http://seclists.org/fulldisclosure/2024/Jul/20", }, { tags: [ "x_transferred", ], url: "http://seclists.org/fulldisclosure/2024/Jul/18", }, { tags: [ "x_transferred", ], url: "http://seclists.org/fulldisclosure/2024/Jul/19", }, { url: "https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { collectionURL: "https://www.openssh.com/", defaultStatus: "unaffected", packageName: "OpenSSH", repo: "https://anongit.mindrot.org/openssh.git", versions: [ { lessThanOrEqual: "9.7p1", status: "affected", version: "8.5p1", versionType: "custom", }, ], }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::appstream", ], defaultStatus: "affected", packageName: "openssh", product: "Red Hat Enterprise Linux 9", vendor: "Red Hat", versions: [ { lessThan: "*", status: "unaffected", version: "0:8.7p1-38.el9_4.1", versionType: "rpm", }, ], }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::appstream", ], defaultStatus: "affected", packageName: "openssh", product: "Red Hat Enterprise Linux 9", vendor: "Red Hat", versions: [ { lessThan: "*", status: "unaffected", version: "0:8.7p1-38.el9_4.1", versionType: "rpm", }, ], }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/a:redhat:rhel_e4s:9.0::appstream", "cpe:/o:redhat:rhel_e4s:9.0::baseos", ], defaultStatus: "affected", packageName: "openssh", product: "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions", vendor: "Red Hat", versions: [ { lessThan: "*", status: "unaffected", version: "0:8.7p1-12.el9_0.1", versionType: "rpm", }, ], }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos", ], defaultStatus: "affected", packageName: "openssh", product: "Red Hat Enterprise Linux 9.2 Extended Update Support", vendor: "Red Hat", versions: [ { lessThan: "*", status: "unaffected", version: "0:8.7p1-30.el9_2.4", versionType: "rpm", }, ], }, { collectionURL: "https://catalog.redhat.com/software/containers/", cpes: [ "cpe:/a:redhat:openshift:4.13::el8", "cpe:/a:redhat:openshift:4.13::el9", ], defaultStatus: "affected", packageName: "rhcos", product: "Red Hat OpenShift Container Platform 4.13", vendor: "Red Hat", versions: [ { lessThan: "*", status: "unaffected", version: "413.92.202407091321-0", versionType: "rpm", }, ], }, { collectionURL: "https://catalog.redhat.com/software/containers/", cpes: [ "cpe:/a:redhat:openshift:4.14::el8", "cpe:/a:redhat:openshift:4.14::el9", ], defaultStatus: "affected", packageName: "rhcos", product: "Red Hat OpenShift Container Platform 4.14", vendor: "Red Hat", versions: [ { lessThan: "*", status: "unaffected", version: "414.92.202407091253-0", versionType: "rpm", }, ], }, { collectionURL: "https://catalog.redhat.com/software/containers/", cpes: [ "cpe:/a:redhat:openshift:4.15::el8", "cpe:/a:redhat:openshift:4.15::el9", ], defaultStatus: "affected", packageName: "rhcos", product: "Red Hat OpenShift Container Platform 4.15", vendor: "Red Hat", versions: [ { lessThan: "*", status: "unaffected", version: "415.92.202407091355-0", versionType: "rpm", }, ], }, { collectionURL: "https://catalog.redhat.com/software/containers/", cpes: [ "cpe:/a:redhat:openshift:4.16::el9", ], defaultStatus: "affected", packageName: "rhcos", product: "Red Hat OpenShift Container Platform 4.16", vendor: "Red Hat", versions: [ { lessThan: "*", status: "unaffected", version: "416.94.202407081958-0", versionType: "rpm", }, ], }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/a:redhat:ceph_storage:5", ], defaultStatus: "unaffected", packageName: "openssh", product: "Red Hat Ceph Storage 5", vendor: "Red Hat", }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/a:redhat:ceph_storage:6", ], defaultStatus: "affected", packageName: "openssh", product: "Red Hat Ceph Storage 6", vendor: "Red Hat", }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/a:redhat:ceph_storage:7", ], defaultStatus: "affected", packageName: "openssh", product: "Red Hat Ceph Storage 7", vendor: "Red Hat", }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/o:redhat:enterprise_linux:6", ], defaultStatus: "unaffected", packageName: "openssh", product: "Red Hat Enterprise Linux 6", vendor: "Red Hat", }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/o:redhat:enterprise_linux:7", ], defaultStatus: "unaffected", packageName: "openssh", product: "Red Hat Enterprise Linux 7", vendor: "Red Hat", }, { collectionURL: "https://access.redhat.com/downloads/content/package-browser/", cpes: [ "cpe:/o:redhat:enterprise_linux:8", ], defaultStatus: "unaffected", packageName: "openssh", product: "Red Hat Enterprise Linux 8", vendor: "Red Hat", }, ], credits: [ { lang: "en", value: "Red Hat would like to thank Qualys Threat Research Unit (TRU) (Qualys) for reporting this issue.", }, ], datePublic: "2024-07-01T08:00:00+00:00", descriptions: [ { lang: "en", value: "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.", }, ], metrics: [ { other: { content: { namespace: "https://access.redhat.com/security/updates/classification/", value: "Important", }, type: "Red Hat severity rating", }, }, { cvssV3_1: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-364", description: "Signal Handler Race Condition", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-11-24T17:19:20.471Z", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2024:4312", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2024:4312", }, { name: "RHSA-2024:4340", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2024:4340", }, { name: "RHSA-2024:4389", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2024:4389", }, { name: "RHSA-2024:4469", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2024:4469", }, { name: "RHSA-2024:4474", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2024:4474", }, { name: "RHSA-2024:4479", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2024:4479", }, { name: "RHSA-2024:4484", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2024:4484", }, { tags: [ "vdb-entry", "x_refsource_REDHAT", ], url: "https://access.redhat.com/security/cve/CVE-2024-6387", }, { name: "RHBZ#2294604", tags: [ "issue-tracking", "x_refsource_REDHAT", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=2294604", }, { url: "https://santandersecurityresearch.github.io/blog/sshing_the_masses.html", }, { url: "https://www.openssh.com/txt/release-9.8", }, { url: "https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt", }, ], timeline: [ { lang: "en", time: "2024-06-27T00:00:00+00:00", value: "Reported to Red Hat.", }, { lang: "en", time: "2024-07-01T08:00:00+00:00", value: "Made public.", }, ], title: "Openssh: regresshion - race condition in ssh allows rce/dos", workarounds: [ { lang: "en", value: "The below process can protect against a Remote Code Execution attack by disabling the LoginGraceTime parameter on Red Hat Enterprise Linux 9. However, the sshd server is still vulnerable to a Denial of Service if an attacker exhausts all the connections.\n\n1) As root user, open the /etc/ssh/sshd_config\n2) Add or edit the parameter configuration:\n~~~\nLoginGraceTime 0\n~~~\n3) Save and close the file\n4) Restart the sshd daemon:\n~~~\nsystemctl restart sshd.service\n~~~\n\nSetting LoginGraceTime to 0 disables the SSHD server's ability to drop connections if authentication is not completed within the specified timeout. If this mitigation is implemented, it is highly recommended to use a tool like 'fail2ban' alongside a firewall to monitor log files and manage connections appropriately.\n\nIf any of the mitigations mentioned above is used, please note that the removal of LoginGraceTime parameter from sshd_config is not automatic when the updated package is installed.", }, ], x_redhatCweChain: "CWE-364: Signal Handler Race Condition", }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2024-6387", datePublished: "2024-07-01T12:37:25.431Z", dateReserved: "2024-06-27T13:41:03.421Z", dateUpdated: "2024-11-24T17:19:20.471Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }