Bug 2294604 (CVE-2024-6387, regreSSHion)
Summary: | CVE-2024-6387 openssh: regreSSHion - race condition in SSH allows RCE/DoS | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Marco Benatto <mbenatto> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | agurenko, akborder, amctagga, anrussel, aoconnor, a.orsaria, arancox, aruffin, ashurbek.hajiyev, bdettelb, bfinger, bniver, borlandt, caswilli, chris.bowles, dbelyavs, dfreiber, doconnor, dreua, drow, eric.eisenhart, etmsys, evs, flucifre, fweimer, gmeno, jan.hohmann, jburrell, jmitchel, jsherril, jtanner, kaycoth, ken.english, kir-ulyanov, klaas, kshier, ljn917, marcus.haggquist, mbenjamin, mbezokon, mhackett, michael.n.nhan, mironov.ivan, mschindl, ngompa13, nico.van.roijen, oarribas, orabin, pdwyer, pgnd, prodsec-ir-bot, qguo, randy, rdey, redhat-bugzilla, redhat, rhbugzilla, ricardo.barberis, sbroz, security-response-team, simon, sostapov, stefano.biagiotti, sthirugn, tallis.elliott, tdeboeser1, teagle, thashimo, unixi, vereddy, vkrizan, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | Flags: | sdodson:
needinfo?
(rdey) agurenko: needinfo- agurenko: needinfo- |
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openssh 8.7p1-38 | Doc Type: | If docs needed, set a value |
Doc Text: |
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2294904, 2294905, 2298747, 2298748, 2300225, 2300226, 2350733, 2350734 | ||
Bug Blocks: | 2294605 | ||
Deadline: | 2024-07-01 |
Description
Marco Benatto
2024-06-27 15:50:11 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:4312 https://access.redhat.com/errata/RHSA-2024:4312 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:4340 https://access.redhat.com/errata/RHSA-2024:4340 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:4389 https://access.redhat.com/errata/RHSA-2024:4389 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.14 Via RHSA-2024:4479 https://access.redhat.com/errata/RHSA-2024:4479 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.13 Via RHSA-2024:4484 https://access.redhat.com/errata/RHSA-2024:4484 This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.15 Via RHSA-2024:4474 https://access.redhat.com/errata/RHSA-2024:4474 (In reply to errata-xmlrpc from comment #19) > This issue has been addressed in the following products: > > Red Hat OpenShift Container Platform 4.15 > https://retrobowl25.com > Via RHSA-2024:4474 https://access.redhat.com/errata/RHSA-2024:4474 Hope these errors don't happen again. This comment was flagged as spam, view the edit history to see the original text if required. This comment was flagged as spam, view the edit history to see the original text if required. |