CVE-2024-6387 OpenSSH Server Authentication Bypass ( cve.mitre.org )

A signal handler race condition was found in OpenSSH's server (sshd), where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog().

catloaf ,

I'm not familiar with this exploit vector. How does this bypass authentication? What's the race you're trying to win when the prompt times out?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • linux@lemmy.world
  • test
  • worldmews
  • mews
  • All magazines