[CLSA-2024:1720093829] openssh: Fix of CVE-2024-6387
Type:
security
Severity:
Important
Release date:
2024-07-04 11:50:32 UTC
Description:
- CVE-2024-6387: the signal handler race condition itself fixed by commenting out the async-signal-unsafe code from the sshsigdie() function
Updated packages:
  • openssh-8.7p1-30.el9_2.tuxcare.els5.x86_64.rpm
    sha:15ea5b40e1a60fd0bdada5e04ab017a5abadf5b5
  • openssh-askpass-8.7p1-30.el9_2.tuxcare.els5.x86_64.rpm
    sha:40f0161ccb08b5f40672173847a0526a86982952
  • openssh-clients-8.7p1-30.el9_2.tuxcare.els5.x86_64.rpm
    sha:095b5cf73c37da015664a02a8f7b7e691a329278
  • openssh-keycat-8.7p1-30.el9_2.tuxcare.els5.x86_64.rpm
    sha:2749fcdcd3c22ab0bd508adb0e1d6a8c548550b2
  • openssh-server-8.7p1-30.el9_2.tuxcare.els5.x86_64.rpm
    sha:0c494700dffb08566047840a56f99cccc4668a82
  • openssh-sk-dummy-8.7p1-30.el9_2.tuxcare.els5.x86_64.rpm
    sha:223ac67cdfd959f65b05c0bca9926a6fc1b58b18
  • pam_ssh_agent_auth-0.10.4-5.30.el9_2.tuxcare.els5.x86_64.rpm
    sha:ae156b8775693f0338609ce8340323bec160f379
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.