Количество 13
Количество 13
CVE-2024-6387
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
CVE-2024-6387
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
CVE-2024-6387
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
CVE-2024-6387
RedHat Openssh: CVE-2024-6387 Remote Code Execution Due To A Race Condition In Signal Handling
CVE-2024-6387
A security regression (CVE-2006-5051) was discovered in OpenSSH's serv ...
SUSE-SU-2024:2275-2
Security update for openssh
SUSE-SU-2024:2275-1
Security update for openssh
GHSA-2x8c-95vh-gfv4
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().
ELSA-2024-4312
ELSA-2024-4312: openssh security update (IMPORTANT)
ELSA-2024-12468
ELSA-2024-12468: openssh security update (IMPORTANT)
BDU:2024-04914
Уязвимость сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код
ROS-20240704-01
Уязвимость openssh
BDU:2024-06777
Уязвимость обработчика сигналов в sshd(8) операционной системы FreeBSD, позволяющая нарушителю выполнить произвольный код в контексте root
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-6387 A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | CVSS3: 8.1 | 39% Средний | больше 1 года назад | |
CVE-2024-6387 A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | CVSS3: 8.1 | 39% Средний | больше 1 года назад | |
CVE-2024-6387 A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | CVSS3: 8.1 | 39% Средний | больше 1 года назад | |
CVE-2024-6387 RedHat Openssh: CVE-2024-6387 Remote Code Execution Due To A Race Condition In Signal Handling | CVSS3: 8.1 | 39% Средний | больше 1 года назад | |
CVE-2024-6387 A security regression (CVE-2006-5051) was discovered in OpenSSH's serv ... | CVSS3: 8.1 | 39% Средний | больше 1 года назад | |
SUSE-SU-2024:2275-2 Security update for openssh | 39% Средний | больше 1 года назад | ||
SUSE-SU-2024:2275-1 Security update for openssh | 39% Средний | больше 1 года назад | ||
GHSA-2x8c-95vh-gfv4 A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). | CVSS3: 8.1 | 39% Средний | больше 1 года назад | |
ELSA-2024-4312 ELSA-2024-4312: openssh security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-12468 ELSA-2024-12468: openssh security update (IMPORTANT) | больше 1 года назад | |||
BDU:2024-04914 Уязвимость сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код | CVSS3: 9 | 39% Средний | больше 1 года назад | |
ROS-20240704-01 Уязвимость openssh | CVSS2: 7.6 | 39% Средний | больше 1 года назад | |
BDU:2024-06777 Уязвимость обработчика сигналов в sshd(8) операционной системы FreeBSD, позволяющая нарушителю выполнить произвольный код в контексте root | CVSS3: 8.1 | 17% Средний | больше 1 года назад |
Уязвимостей на страницу