CVE-2024-6387
01.07.2024, 13:15
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
| Vendor | Product | Version |
|---|---|---|
| sonicwall | sma_6200_firmware | - |
| sonicwall | sma_7200_firmware | - |
| arista | eos | 4.32.0 ≤ 𝑥 ≤ 4.32.1f |
| canonical | ubuntu_linux | 23.10 |
| canonical | ubuntu_linux | 24.04 |
| almalinux | almalinux | 9.0 |
| sonicwall | sma_6210_firmware | - |
| sonicwall | sma_7210_firmware | - |
| sonicwall | sma_8200v_firmware | - |
| sonicwall | sra_ex_7000_firmware | - |
| netapp | a1k_firmware | - |
| netapp | a70_firmware | - |
| netapp | a90_firmware | - |
| netapp | a700s_firmware | - |
| netapp | 8300_firmware | - |
| netapp | 8700_firmware | - |
| netapp | a400_firmware | - |
| netapp | c400_firmware | - |
| netapp | a250_firmware | - |
| netapp | 500f_firmware | - |
| netapp | c250_firmware | - |
| netapp | a800_firmware | - |
| netapp | c800_firmware | - |
| netapp | a900_firmware | - |
| netapp | a9500_firmware | - |
| netapp | c190_firmware | - |
| netapp | a150_firmware | - |
| netapp | a220_firmware | - |
| netapp | fas2720_firmware | - |
| netapp | fas2750_firmware | - |
| netapp | fas2820_firmware | - |
| netapp | bootstrap_os | - |
| apple | macos | 12.0 ≤ 𝑥 < 12.7.6 |
| apple | macos | 13.0 ≤ 𝑥 < 13.6.8 |
| apple | macos | 14.0 ≤ 𝑥 < 14.6 |
| openbsd | openssh | 𝑥 < 4.4 |
| openbsd | openssh | 8.6 ≤ 𝑥 ≤ 9.8 |
| openbsd | openssh | 4.4 |
| openbsd | openssh | 8.5:p1 |
| openbsd | openssh | 8.6 |
| redhat | openshift_container_platform | 4.0 |
| redhat | enterprise_linux | 9.0 |
| redhat | enterprise_linux_eus | 9.4 |
| redhat | enterprise_linux_for_arm_64 | 9.0_aarch64:_aarch64 |
| redhat | enterprise_linux_for_arm_64_eus | 9.4_aarch64:_aarch64 |
| redhat | enterprise_linux_for_ibm_z_systems | 9.0_s390x:_s390x |
| redhat | enterprise_linux_for_ibm_z_systems_eus | 9.4_s390x:_s390x |
| redhat | enterprise_linux_for_power_little_endian | 9.0_ppc64le:_ppc64le |
| redhat | enterprise_linux_for_power_little_endian_eus | 9.4_ppc64le:_ppc64le |
| redhat | enterprise_linux_server_aus | 9.4 |
| suse | linux_enterprise_micro | 6.0 |
| debian | debian_linux | 12.0 |
| canonical | ubuntu_linux | 22.04 |
| canonical | ubuntu_linux | 22.10 |
| canonical | ubuntu_linux | 23.04 |
| amazon | amazon_linux | 2023.0 |
| netapp | active_iq_unified_manager | - |
| netapp | e-series_santricity_os_controller | 11.0.0 ≤ 𝑥 ≤ 11.70.2 |
| netapp | ontap_select_deploy_administration_utility | - |
| freebsd | freebsd | 13.2 |
| freebsd | freebsd | 13.2:p1 |
| freebsd | freebsd | 13.2:p10 |
| freebsd | freebsd | 13.2:p11 |
| freebsd | freebsd | 13.2:p2 |
| freebsd | freebsd | 13.2:p3 |
| freebsd | freebsd | 13.2:p4 |
| freebsd | freebsd | 13.2:p5 |
| freebsd | freebsd | 13.2:p6 |
| freebsd | freebsd | 13.2:p7 |
| freebsd | freebsd | 13.2:p8 |
| freebsd | freebsd | 13.2:p9 |
| freebsd | freebsd | 13.3 |
| freebsd | freebsd | 13.3:p1 |
| freebsd | freebsd | 13.3:p2 |
| freebsd | freebsd | 13.3:p3 |
| freebsd | freebsd | 14.0 |
| freebsd | freebsd | 14.0:beta5 |
| freebsd | freebsd | 14.0:p1 |
| freebsd | freebsd | 14.0:p2 |
| freebsd | freebsd | 14.0:p3 |
| freebsd | freebsd | 14.0:p4 |
| freebsd | freebsd | 14.0:p5 |
| freebsd | freebsd | 14.0:p6 |
| freebsd | freebsd | 14.0:p7 |
| freebsd | freebsd | 14.0:rc3 |
| freebsd | freebsd | 14.0:rc4-p1 |
| freebsd | freebsd | 14.1 |
| freebsd | freebsd | 14.1:p1 |
| netbsd | netbsd | 𝑥 ≤ 10.0.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| openssh |
| ||||||||||||||
| openssh-ssh1 |
|
Common Weakness Enumeration
- CWE-364 - Signal Handler Race ConditionThe software uses a signal handler that introduces a race condition.
- CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
References