CVE-2024-6387

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
Race Condition
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
redhatCNA
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
VendorProductVersion
openbsdopenssh
𝑥
< 4.4
openbsdopenssh
8.6 ≤
𝑥
< 9.8
openbsdopenssh
4.4
openbsdopenssh
8.5:p1
redhatopenshift_container_platform
4.0
redhatenterprise_linux
9.0
redhatenterprise_linux_eus
9.4
redhatenterprise_linux_for_arm_64
9.0_aarch64:_aarch64
redhatenterprise_linux_for_arm_64_eus
9.4_aarch64:_aarch64
redhatenterprise_linux_for_ibm_z_systems
9.0_s390x:_s390x
redhatenterprise_linux_for_ibm_z_systems_eus
9.4_s390x:_s390x
redhatenterprise_linux_for_power_little_endian
9.0_ppc64le:_ppc64le
redhatenterprise_linux_for_power_little_endian_eus
9.4_ppc64le:_ppc64le
redhatenterprise_linux_server_aus
9.4
suselinux_enterprise_micro
6.0
debiandebian_linux
12.0
canonicalubuntu_linux
22.04
canonicalubuntu_linux
22.10
canonicalubuntu_linux
23.04
amazonlinux_2023
-
netappe-series_santricity_os_controller
11.0.0 ≤
𝑥
≤ 11.70.2
netappontap_select_deploy_administration_utility
-
freebsdfreebsd
13.2
freebsdfreebsd
13.2:p1
freebsdfreebsd
13.2:p10
freebsdfreebsd
13.2:p11
freebsdfreebsd
13.2:p2
freebsdfreebsd
13.2:p3
freebsdfreebsd
13.2:p4
freebsdfreebsd
13.2:p5
freebsdfreebsd
13.2:p6
freebsdfreebsd
13.2:p7
freebsdfreebsd
13.2:p8
freebsdfreebsd
13.2:p9
freebsdfreebsd
13.3
freebsdfreebsd
13.3:p1
freebsdfreebsd
13.3:p2
freebsdfreebsd
13.3:p3
freebsdfreebsd
14.0
freebsdfreebsd
14.0:beta5
freebsdfreebsd
14.0:p1
freebsdfreebsd
14.0:p2
freebsdfreebsd
14.0:p3
freebsdfreebsd
14.0:p4
freebsdfreebsd
14.0:p5
freebsdfreebsd
14.0:p6
freebsdfreebsd
14.0:p7
freebsdfreebsd
14.0:rc3
freebsdfreebsd
14.0:rc4-p1
freebsdfreebsd
14.1
freebsdfreebsd
14.1:p1
netbsdnetbsd
𝑥
≤ 10.0.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssh
bullseye
1:8.4p1-5+deb11u3
not-affected
bullseye (security)
1:8.4p1-5+deb11u5
fixed
bookworm
1:9.2p1-2+deb12u6
fixed
bookworm (security)
1:9.2p1-2+deb12u5
fixed
sid
1:10.0p1-5
fixed
trixie
1:10.0p1-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssh
noble
Fixed 1:9.6p1-3ubuntu13.3
released
mantic
Fixed 1:9.3p1-1ubuntu3.6
released
jammy
Fixed 1:8.9p1-3ubuntu0.10
released
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected
openssh-ssh1
noble
not-affected
mantic
not-affected
jammy
not-affected
focal
not-affected
bionic
not-affected
References