GHSA-2X8C-95VH-GFV4
Vulnerability from github – Published: 2024-07-01 15:32 – Updated: 2025-04-24 21:31
VLAI?
Details
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
Severity ?
8.1 (High)
{
"affected": [],
"aliases": [
"CVE-2024-6387"
],
"database_specific": {
"cwe_ids": [
"CWE-362",
"CWE-364"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-01T13:15:06Z",
"severity": "HIGH"
},
"details": "A signal handler race condition was found in OpenSSH\u0027s server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd\u0027s SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().",
"id": "GHSA-2x8c-95vh-gfv4",
"modified": "2025-04-24T21:31:48Z",
"published": "2024-07-01T15:32:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6387"
},
{
"type": "WEB",
"url": "https://github.com/rapier1/hpn-ssh/issues/87"
},
{
"type": "WEB",
"url": "https://github.com/oracle/oracle-linux/issues/149"
},
{
"type": "WEB",
"url": "https://github.com/microsoft/azurelinux/issues/9555"
},
{
"type": "WEB",
"url": "https://github.com/PowerShell/Win32-OpenSSH/issues/2249"
},
{
"type": "WEB",
"url": "https://github.com/Azure/AKS/issues/4379"
},
{
"type": "WEB",
"url": "https://github.com/AlmaLinux/updates/issues/629"
},
{
"type": "WEB",
"url": "https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:4312"
},
{
"type": "WEB",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010"
},
{
"type": "WEB",
"url": "https://santandersecurityresearch.github.io/blog/sshing_the_masses.html"
},
{
"type": "WEB",
"url": "https://security-tracker.debian.org/tracker/CVE-2024-6387"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20240701-0001"
},
{
"type": "WEB",
"url": "https://sig-security.rocky.page/issues/CVE-2024-6387"
},
{
"type": "WEB",
"url": "https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT214118"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT214119"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT214120"
},
{
"type": "WEB",
"url": "https://ubuntu.com/security/CVE-2024-6387"
},
{
"type": "WEB",
"url": "https://ubuntu.com/security/notices/USN-6859-1"
},
{
"type": "WEB",
"url": "https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do"
},
{
"type": "WEB",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/52269"
},
{
"type": "WEB",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc"
},
{
"type": "WEB",
"url": "https://www.openssh.com/txt/release-9.8"
},
{
"type": "WEB",
"url": "https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt"
},
{
"type": "WEB",
"url": "https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html"
},
{
"type": "WEB",
"url": "https://www.suse.com/security/cve/CVE-2024-6387.html"
},
{
"type": "WEB",
"url": "https://www.theregister.com/2024/07/01/regresshion_openssh"
},
{
"type": "WEB",
"url": "https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:4340"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:4389"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:4469"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:4474"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:4479"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2024:4484"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2024-6387"
},
{
"type": "WEB",
"url": "https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1"
},
{
"type": "WEB",
"url": "https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux"
},
{
"type": "WEB",
"url": "https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294604"
},
{
"type": "WEB",
"url": "https://explore.alas.aws.amazon.com/CVE-2024-6387.html"
},
{
"type": "WEB",
"url": "https://forum.vmssoftware.com/viewtopic.php?f=8\u0026t=9132"
},
{
"type": "WEB",
"url": "https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc"
},
{
"type": "WEB",
"url": "https://github.com/PowerShell/Win32-OpenSSH/discussions/2248"
},
{
"type": "WEB",
"url": "https://github.com/zgzhang/cve-2024-6387-poc"
},
{
"type": "WEB",
"url": "https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY"
},
{
"type": "WEB",
"url": "https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html"
},
{
"type": "WEB",
"url": "https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html"
},
{
"type": "WEB",
"url": "https://news.ycombinator.com/item?id=40843778"
},
{
"type": "WEB",
"url": "https://packetstorm.news/files/id/190587"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2024/Jul/18"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2024/Jul/19"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2024/Jul/20"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/01/12"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/01/13"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/02/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/03/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/03/11"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/03/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/03/3"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/03/4"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/03/5"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/04/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/04/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/08/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/08/3"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/09/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/09/5"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/10/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/10/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/10/3"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/10/4"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/10/6"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/11/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/11/3"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/23/4"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/23/6"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/28/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2024/07/28/3"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…