Количество 13
Количество 13
GHSA-2x8c-95vh-gfv4
A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().

CVE-2024-6387
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVE-2024-6387
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVE-2024-6387
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVE-2024-6387
RedHat Openssh: CVE-2024-6387 Remote Code Execution Due To A Race Condition In Signal Handling
CVE-2024-6387
A security regression (CVE-2006-5051) was discovered in OpenSSH's serv ...

SUSE-SU-2024:2275-2
Security update for openssh

SUSE-SU-2024:2275-1
Security update for openssh
ELSA-2024-4312
ELSA-2024-4312: openssh security update (IMPORTANT)
ELSA-2024-12468
ELSA-2024-12468: openssh security update (IMPORTANT)

BDU:2024-04914
Уязвимость сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код

ROS-20240704-01
Уязвимость openssh

BDU:2024-06777
Уязвимость обработчика сигналов в sshd(8) операционной системы FreeBSD, позволяющая нарушителю выполнить произвольный код в контексте root
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-2x8c-95vh-gfv4 A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). | CVSS3: 8.1 | 52% Средний | 12 месяцев назад | |
![]() | CVE-2024-6387 A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | CVSS3: 8.1 | 52% Средний | 12 месяцев назад |
![]() | CVE-2024-6387 A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | CVSS3: 8.1 | 52% Средний | 12 месяцев назад |
![]() | CVE-2024-6387 A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. | CVSS3: 8.1 | 52% Средний | 12 месяцев назад |
![]() | CVE-2024-6387 RedHat Openssh: CVE-2024-6387 Remote Code Execution Due To A Race Condition In Signal Handling | CVSS3: 8.1 | 52% Средний | 11 месяцев назад |
CVE-2024-6387 A security regression (CVE-2006-5051) was discovered in OpenSSH's serv ... | CVSS3: 8.1 | 52% Средний | 12 месяцев назад | |
![]() | SUSE-SU-2024:2275-2 Security update for openssh | 52% Средний | 12 месяцев назад | |
![]() | SUSE-SU-2024:2275-1 Security update for openssh | 52% Средний | 12 месяцев назад | |
ELSA-2024-4312 ELSA-2024-4312: openssh security update (IMPORTANT) | 12 месяцев назад | |||
ELSA-2024-12468 ELSA-2024-12468: openssh security update (IMPORTANT) | 12 месяцев назад | |||
![]() | BDU:2024-04914 Уязвимость сервера средства криптографической защиты OpenSSH, позволяющая нарушителю выполнить произвольный код | CVSS3: 9 | 52% Средний | 12 месяцев назад |
![]() | ROS-20240704-01 Уязвимость openssh | CVSS2: 7.6 | 52% Средний | 12 месяцев назад |
![]() | BDU:2024-06777 Уязвимость обработчика сигналов в sshd(8) операционной системы FreeBSD, позволяющая нарушителю выполнить произвольный код в контексте root | CVSS3: 8.1 | 2% Низкий | 11 месяцев назад |
Уязвимостей на страницу