Jan 6, 2026·5 min read·3 visits
OpenSSH server (sshd) contains a race condition in its signal handling logic. By winning a race against the `LoginGraceTime` timer, an unauthenticated attacker can interrupt the heap manager in an inconsistent state, leading to heap corruption and eventual Remote Code Execution (RCE) as root. It affects default configurations of OpenSSH versions 8.5p1 through 9.7p1 on glibc-based Linux systems.
A signal handler race condition in OpenSSH's sshd allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems. This is a regression of a vulnerability originally fixed in 2006 (CVE-2006-5051).
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
OpenSSH OpenBSD | >= 8.5p1, < 9.8p1 | 9.8p1 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-364 |
| Attack Vector | Network |
| CVSS | 8.1 (High) |
| Impact | Remote Code Execution (Root) |
| Architecture | x86 (glibc), amd64 (glibc) |
| Complexity | High (Race Condition) |