Jan 6, 2026·5 min read·3 visits
OpenSSH server (sshd) contains a critical race condition. By manipulating the `LoginGraceTime` timeout, an attacker can interrupt the server's execution flow in a way that corrupts the heap, leading to unauthenticated remote code execution as root. If you are running OpenSSH versions 8.5p1 to 9.7p1 on Linux, patch immediately.
A signal handler race condition in OpenSSH's sshd allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems. This is a regression of CVE-2006-5051, proving that history doesn't just repeat itself—it recompiles.
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
OpenSSH OpenBSD | >= 8.5p1, < 9.8p1 | 9.8p1 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-364 (Signal Handler Race Condition) |
| Attack Vector | Network (AV:N) |
| CVSS Score | 8.1 (High) |
| Privileges Required | None (PR:N) |
| User Interaction | None (UI:N) |
| Exploit Status | Proof of Concept (High Complexity) |
The software handles a signal in a way that causes the application to enter an inconsistent state, specifically by invoking functions that are not async-signal-safe.