www.cve.org
Open in
urlscan Pro
18.245.60.66
Public Scan
URL:
https://www.cve.org/CVERecord?id=CVE-2024-6387
Submission: On July 01 via api from OM — Scanned from DE
Submission: On July 01 via api from OM — Scanned from DE
Form analysis
0 forms found in the DOMText Content
We're sorry but the CVE Website doesn't work properly without JavaScript enabled. Please enable it to continue. Skip to main content About OverviewHistoryProcessRelated EffortsMetrics Partner Information PartnerList of Partners Program Organization StructureProgram Relationship with PartnersBoardWorking GroupsCVE Numbering AuthoritiesAuthorized Data Publishers Downloads Resources & Support ResourcesGlossaryFAQs AllRecentArchivesNewsletter Sign-Up Reserve IDs & Publish RecordsCVE Services Report/Request CNAsNon-CNAs Site Search Find Find CVE Records by keyword on cve.mitre.org. Site Search CVE-2024-6387 PUBLISHED View JSON | User Guide information CVE Record vulnerability information is now being enriched by CNAs and ADPs collapse * CNA Assigner: Red Hat, Inc. Published: 2024-07-01 Updated: 2024-07-01 Title: Openssh: possible remote code execution due to a race condition in signal handling DESCRIPTION A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). CWE Learn more * CWE-364: Signal Handler Race Condition CVSS Learn more ScoreSeverityVersionVector String8.1HIGH3.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H PRODUCT STATUS Learn more Vendor Red Hat Product Red Hat Enterprise Linux 6 Versions Default Status: All versions are unaffected Vendor Red Hat Product Red Hat Enterprise Linux 7 Versions Default Status: All versions are unaffected Vendor Red Hat Product Red Hat Enterprise Linux 8 Versions Default Status: All versions are unaffected Vendor Red Hat Product Red Hat Enterprise Linux 9 Versions Default Status: All versions are affected REFERENCES * http://www.openwall.com/lists/oss-security/2024/07/01/12 external site * https://access.redhat.com/security/cve/CVE-2024-6387 external site vdb-entry * bugzilla.redhat.com: RHBZ#2294604 external site issue-tracking * https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt external site * https://github.com/zgzhang/cve-2024-6387-poc external site * https://ubuntu.com/security/CVE-2024-6387 external site * https://ubuntu.com/security/notices/USN-6859-1 external site * https://www.suse.com/security/cve/CVE-2024-6387.html external site * https://explore.alas.aws.amazon.com/CVE-2024-6387.html external site * https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/ external site * https://www.openssh.com/txt/release-9.8 external site * https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html external site * https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html external site * https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server external site * https://www.theregister.com/2024/07/01/regresshion_openssh/ external site * https://news.ycombinator.com/item?id=40843778 external site * https://security-tracker.debian.org/tracker/CVE-2024-6387 external site * https://github.com/oracle/oracle-linux/issues/149 external site * https://github.com/rapier1/hpn-ssh/issues/87 external site View additional information about CVE-2024-6387 external site on NVD. (Note: The NVD is not operated by the CVE Program) POLICIES & COOKIES * Terms of Use * Website Security Policy * Privacy Policy * Cookie Notice * Manage Cookies MEDIA * News * Blogs * Podcasts * Email newsletter sign up SOCIAL MEDIA github linkedin mastodon youtube medium x-twitter icon for @CVEnew New CVE Records x-twitter icon for @CVEannounce CVE Announce CONTACT * CVE Program Support external site * CNA Partners * CVE Website Support external site * CVE Program Idea Tracker external site Use of the CVE® List and the associated references from this website are subject to the terms of use. CVE is sponsored by the U.S. Department of Homeland Security (DHS) external link Cybersecurity and Infrastructure Security Agency (CISA) external link . Copyright © 1999-2024, The MITRE Corporation external link . CVE and the CVE logo are registered trademarks of The MITRE Corporation.