A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
History
24 Apr 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2024-07-01 13:15
Updated : 2025-04-24 19:15
NVD link : CVE-2024-6387
Mitre link : CVE-2024-6387
CVE.ORG link : CVE-2024-6387
JSON object : View
Products Affected
redhat
- enterprise_linux_server_aus
- enterprise_linux_for_ibm_z_systems
- openshift_container_platform
- enterprise_linux_eus
- enterprise_linux
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_for_arm_64
- enterprise_linux_for_arm_64_eus
- enterprise_linux_for_power_little_endian
- enterprise_linux_for_ibm_z_systems_eus
netbsd
- netbsd
netapp
- ontap_tools
- ontap_select_deploy_administration_utility
- e-series_santricity_os_controller
canonical
- ubuntu_linux
openbsd
- openssh
amazon
- linux_2023
debian
- debian_linux
freebsd
- freebsd
suse
- linux_enterprise_micro