We have not investigated any other libc oroperating system; but OpenBSD is notably not vulnerable, because itsSIGALRM handler calls syslog_r(), an async-signal-safer version ofsyslog() that was invented by OpenBSD in 2001.
If sshd(8) cannot be updated, this signal handler race condition can bemitigated by setting LoginGraceTime to 0 in /etc/ssh/sshd_config andrestarting sshd(8). This makes sshd(8) vulnerable to a denial of service(the exhaustion of all MaxStartups connections), but makes it safe from theremote code execution presented in this advisory.
All supported branches plus 13.2 (which is technically EOL but only for two day, now) received an SSH update that fixes the issue.