{"id":"AZL-43024","summary":"CVE-2024-6387 affecting package openssh for versions less than 9.8p1-1","details":"A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.","modified":"2026-04-01T05:14:57.312164Z","published":"2024-07-01T13:15:06Z","upstream":["CVE-2024-6387"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6387"}],"affected":[{"package":{"name":"openssh","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/openssh"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.8p1-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-43024.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}