Nixpkgs Security Tracker

Login with GitHub

Suggestion detail

Untriaged
Permalink CVE-2024-6387
8.1 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
created 6 months, 1 week ago
Openssh: possible remote code execution due to a race condition in signal handling

A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().

References

Affected products

rhcos
  • *
OpenSSH
  • =<9.7p1
openssh
  • *
rhceph-6-rhel9

Matching in nixpkgs

pkgs.openssh

Implementation of the SSH protocol

  • nixos-unstable -

pkgs.openssh_hpn

Implementation of the SSH protocol with high performance networking patches

  • nixos-unstable -

pkgs.openssh_gssapi

Implementation of the SSH protocol with GSSAPI support

  • nixos-unstable -

Package maintainers