OpenSSH Security Vulnerability: CVE-2024-6387

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • developercat
    New Member
    • May 2024
    • 24

    OpenSSH Security Vulnerability: CVE-2024-6387

    A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().

    Resources:
    • https://cloud.google.co m/compute/docs/security-bulletins?&_gl= 1*1nzlcun*_ga*N zE0MjU2MzgxLjE3 MTk4NzMwNjQ.*_g a_WH2QY8WWF5*MT cxOTg3MzA2NC4xL jAuMTcxOTg3MzA2 NS41OS4wLjA.&_g a=2.48702560.-714256381.17198 73064#gcp-2024-040
    • https://www.openssh.com/txt/release-9.8
    • https://ubuntu.com/security/CVE-2024-6387
    • https://explore.alas.aw s.amazon.com/CVE-2024-6387.html
    • https://psirt.global.so nicwall.com/vuln-detail/SNWLID-2024-0010
    • https://psirt.global.so nicwall.com/vuln-detail/SNWLID-2024-0010
Working...