Количество 13
Количество 13

CVE-2024-6387
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVE-2024-6387
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVE-2024-6387
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVE-2024-6387
RedHat Openssh: CVE-2024-6387 Remote Code Execution Due To A Race Condition In Signal Handling
CVE-2024-6387
A security regression (CVE-2006-5051) was discovered in OpenSSH's serv ...

SUSE-SU-2024:2275-2
Security update for openssh

SUSE-SU-2024:2275-1
Security update for openssh
GHSA-2x8c-95vh-gfv4
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
ELSA-2024-4312
ELSA-2024-4312: openssh security update (IMPORTANT)
ELSA-2024-12468
ELSA-2024-12468: openssh security update (IMPORTANT)

BDU:2024-04914
Уязвимость сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код

ROS-20240704-01
Уязвимость openssh

BDU:2024-06777
Уязвимость обработчика сигналов в sshd(8) операционной системы FreeBSD, позволяющая нарушителю выполнить произвольный код в контексте root
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-6387 A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | CVSS3: 8.1 | 73% Высокий | около 1 года назад |
![]() | CVE-2024-6387 A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | CVSS3: 8.1 | 73% Высокий | около 1 года назад |
![]() | CVE-2024-6387 A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | CVSS3: 8.1 | 73% Высокий | около 1 года назад |
![]() | CVE-2024-6387 RedHat Openssh: CVE-2024-6387 Remote Code Execution Due To A Race Condition In Signal Handling | CVSS3: 8.1 | 73% Высокий | около 1 года назад |
CVE-2024-6387 A security regression (CVE-2006-5051) was discovered in OpenSSH's serv ... | CVSS3: 8.1 | 73% Высокий | около 1 года назад | |
![]() | SUSE-SU-2024:2275-2 Security update for openssh | 73% Высокий | около 1 года назад | |
![]() | SUSE-SU-2024:2275-1 Security update for openssh | 73% Высокий | около 1 года назад | |
GHSA-2x8c-95vh-gfv4 A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). | CVSS3: 8.1 | 73% Высокий | около 1 года назад | |
ELSA-2024-4312 ELSA-2024-4312: openssh security update (IMPORTANT) | около 1 года назад | |||
ELSA-2024-12468 ELSA-2024-12468: openssh security update (IMPORTANT) | около 1 года назад | |||
![]() | BDU:2024-04914 Уязвимость сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код | CVSS3: 9 | 73% Высокий | около 1 года назад |
![]() | ROS-20240704-01 Уязвимость openssh | CVSS2: 7.6 | 73% Высокий | около 1 года назад |
![]() | BDU:2024-06777 Уязвимость обработчика сигналов в sshd(8) операционной системы FreeBSD, позволяющая нарушителю выполнить произвольный код в контексте root | CVSS3: 8.1 | 2% Низкий | около 1 года назад |
Уязвимостей на страницу