CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Dashboard
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



GHSA-9C48-W39G-HM26
8.14.50%

regreSSHion: The Return of the Signal Handler Nightmare

Alon Barad
Alon Barad
Software Engineer

Jan 6, 2026·5 min read·3 visits

PoC AvailableCISA KEV Listed

Executive Summary (TL;DR)

OpenSSH server (sshd) contains a race condition in its signal handling logic. By winning a race against the `LoginGraceTime` timer, an unauthenticated attacker can interrupt the heap manager in an inconsistent state, leading to heap corruption and eventual Remote Code Execution (RCE) as root. It affects default configurations of OpenSSH versions 8.5p1 through 9.7p1 on glibc-based Linux systems.

A signal handler race condition in OpenSSH's sshd allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems. This is a regression of a vulnerability originally fixed in 2006 (CVE-2006-5051).

Official Patches

OpenSSHOpenSSH 9.8 Release Notes

Fix Analysis (1)

Technical Appendix

CVSS Score
8.1/ 10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
4.50%

Affected Systems

Linux systems using glibcOpenSSH 8.5p1OpenSSH 8.6p1OpenSSH 8.7p1OpenSSH 8.8p1OpenSSH 8.9p1OpenSSH 9.0p1OpenSSH 9.1p1OpenSSH 9.2p1OpenSSH 9.3p1OpenSSH 9.4p1OpenSSH 9.5p1OpenSSH 9.6p1OpenSSH 9.7p1

Affected Versions Detail

Product
Affected Versions
Fixed Version
OpenSSH
OpenBSD
>= 8.5p1, < 9.8p19.8p1
AttributeDetail
CWE IDCWE-364
Attack VectorNetwork
CVSS8.1 (High)
ImpactRemote Code Execution (Root)
Architecturex86 (glibc), amd64 (glibc)
ComplexityHigh (Race Condition)

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1068Exploitation for Privilege Escalation
Privilege Escalation
CWE-364
Signal Handler Race Condition

Vulnerability Timeline

Original bug (CVE-2006-5051) patched
2006-09-28
Regression introduced in OpenSSH 8.5p1
2020-10-01
Qualys discloses CVE-2024-6387 (regreSSHion)
2024-07-01
OpenSSH 9.8p1 released with fix
2024-07-01

References & Sources

  • [1]Qualys Security Advisory: regreSSHion
Related Vulnerabilities
CVE-2006-5051CVE-2024-6387

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.