{"id":"JLSEC-2026-71","details":"A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.","modified":"2026-04-09T21:48:29.336635Z","published":"2026-04-09T21:32:46.691Z","upstream":["CVE-2024-6387"],"database_specific":{"sources":[{"html_url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6387","modified":"2025-09-30T13:52:23.540Z","id":"CVE-2024-6387","imported":"2026-04-09T14:56:19.267Z","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-6387","published":"2024-07-01T13:15:06.467Z"}],"license":"CC-BY-4.0"},"references":[{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:4312"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:4340"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:4389"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:4469"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:4474"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:4479"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:4484"},{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2024-6387"},{"type":"WEB","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2294604"},{"type":"WEB","url":"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html"},{"type":"WEB","url":"https://www.openssh.com/txt/release-9.8"},{"type":"WEB","url":"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2024/Jul/19"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2024/Jul/20"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/01/12"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/01/13"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/02/1"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/03/1"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/03/11"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/03/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/03/3"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/03/4"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/03/5"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/04/1"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/04/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/08/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/08/3"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/09/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/09/5"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/10/1"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/10/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/10/3"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/10/4"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/10/6"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/11/1"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/11/3"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/23/4"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/23/6"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/28/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/28/3"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:4312"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:4340"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:4389"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:4469"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:4474"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:4479"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2024:4484"},{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2024-6387"},{"type":"WEB","url":"https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/"},{"type":"WEB","url":"https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/"},{"type":"WEB","url":"https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server"},{"type":"WEB","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2294604"},{"type":"WEB","url":"https://explore.alas.aws.amazon.com/CVE-2024-6387.html"},{"type":"WEB","url":"https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132"},{"type":"WEB","url":"https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc"},{"type":"WEB","url":"https://github.com/AlmaLinux/updates/issues/629"},{"type":"WEB","url":"https://github.com/Azure/AKS/issues/4379"},{"type":"WEB","url":"https://github.com/PowerShell/Win32-OpenSSH/discussions/2248"},{"type":"WEB","url":"https://github.com/PowerShell/Win32-OpenSSH/issues/2249"},{"type":"WEB","url":"https://github.com/microsoft/azurelinux/issues/9555"},{"type":"WEB","url":"https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09"},{"type":"WEB","url":"https://github.com/oracle/oracle-linux/issues/149"},{"type":"WEB","url":"https://github.com/rapier1/hpn-ssh/issues/87"},{"type":"WEB","url":"https://github.com/zgzhang/cve-2024-6387-poc"},{"type":"WEB","url":"https://lists.almalinux.org/archives/list/announce@lists.almalinux.org/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/"},{"type":"WEB","url":"https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html"},{"type":"WEB","url":"https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html"},{"type":"WEB","url":"https://news.ycombinator.com/item?id=40843778"},{"type":"WEB","url":"https://packetstorm.news/files/id/190587/"},{"type":"WEB","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010"},{"type":"WEB","url":"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html"},{"type":"WEB","url":"https://security-tracker.debian.org/tracker/CVE-2024-6387"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20240701-0001/"},{"type":"WEB","url":"https://sig-security.rocky.page/issues/CVE-2024-6387/"},{"type":"WEB","url":"https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/"},{"type":"WEB","url":"https://support.apple.com/kb/HT214118"},{"type":"WEB","url":"https://support.apple.com/kb/HT214119"},{"type":"WEB","url":"https://support.apple.com/kb/HT214120"},{"type":"WEB","url":"https://ubuntu.com/security/CVE-2024-6387"},{"type":"WEB","url":"https://ubuntu.com/security/notices/USN-6859-1"},{"type":"WEB","url":"https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do"},{"type":"WEB","url":"https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100"},{"type":"WEB","url":"https://www.exploit-db.com/exploits/52269"},{"type":"WEB","url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc"},{"type":"WEB","url":"https://www.openssh.com/txt/release-9.8"},{"type":"WEB","url":"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt"},{"type":"WEB","url":"https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-6387.html"},{"type":"WEB","url":"https://www.theregister.com/2024/07/01/regresshion_openssh/"},{"type":"WEB","url":"https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387"}],"affected":[{"package":{"name":"OpenSSH_jll","ecosystem":"Julia","purl":"pkg:julia/OpenSSH_jll?uuid=9bd350c2-7e96-507f-8002-3f2e150b4e1b"},"ranges":[{"type":"SEMVER","events":[{"introduced":"8.9.0+0"},{"fixed":"9.9.1+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2026/JLSEC-2026-71.json"}}],"schema_version":"1.7.5"}