CVE-2024-6409

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-6409
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-6409.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-6409
Related
Withdrawn
2024-09-14T01:38:43.750803Z
Published
2024-07-08T18:15:09Z
Modified
2024-09-12T21:47:19.429156Z
Summary
[none]
Details

A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.

References

Affected packages

Git / github.com/openela-main/openssh

Affected ranges

Type
GIT
Repo
https://github.com/openela-main/openssh
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

imports/el9/openssh-8.*

imports/el9/openssh-8.7p1-30.el9_2
imports/el9/openssh-8.7p1-34.el9
imports/el9/openssh-8.7p1-34.el9_3.3
imports/el9/openssh-8.7p1-38.el9
imports/el9/openssh-8.7p1-38.el9_4.1