GHSA-4C5F-9MJ4-M247

regreSSHion: Time Travel is Real, and It Roots Your Box

Alon Barad
Alon Barad
Software Engineer

Jan 5, 2026·5 min read·1 visit

Executive Summary (TL;DR)

OpenSSH's `sshd` has a race condition in its `SIGALRM` handler. If a client doesn't authenticate within the `LoginGraceTime` (usually 120s), the handler fires. Unfortunately, the handler calls `syslog()`, which is not async-signal-safe. If this interrupts the heap manager (malloc/free) in the main thread, heap corruption occurs. Attackers can exploit this to gain unauthenticated root access, though it takes ~10,000 attempts (6-8 hours) on average.

A signal handler race condition in OpenSSH's sshd allows unauthenticated remote code execution as root on glibc-based Linux systems. This is a regression of a vulnerability originally fixed in 2006, proving that history doesn't just repeat itself—it recompiles.

Technical Appendix

CVSS Score
8.1/ 10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
4.00%
Top 99% most exploited
14,000,000
via Shodan

Affected Systems

OpenSSH 8.5p1 through 9.7p1glibc-based Linux systems

Affected Versions Detail

Product
Affected Versions
Fixed Version
OpenSSH
OpenBSD Foundation
>= 8.5p1, < 9.8p19.8p1
AttributeDetail
CWE IDCWE-364
Attack VectorNetwork (AV:N)
ImpactRoot RCE
CVSS v3.18.1 (High)
Exploit StatusPoC Available / Complex
ComplexityHigh (AC:H)
CWE-364
Signal Handler Race Condition

Signal Handler Race Condition causing memory corruption

Vulnerability Timeline

Original bug (CVE-2006-5051) patched.
2006-09-28
Regression introduced in OpenSSH 8.5p1.
2020-10-01
Qualys discloses CVE-2024-6387.
2024-07-01
OpenSSH 9.8p1 released.
2024-07-01