A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

The process is identical to CVE-2024-6387, by disabling LoginGraceTime. See that CVE page for additional details.

History

Thu, 22 May 2025 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10

Sun, 24 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Aug 2024 12:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.13::el8
cpe:/a:redhat:openshift:4.13::el9
References

Wed, 07 Aug 2024 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.14::el8
cpe:/a:redhat:openshift:4.14::el9
References

Wed, 07 Aug 2024 04:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:openshift:4.15::el8
cpe:/a:redhat:openshift:4.15::el9
References

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-08-30T22:46:40.947Z

Reserved: 2024-06-28T18:10:24.954Z

Link: CVE-2024-6409

cve-icon Vulnrichment

Updated: 2024-08-01T21:41:03.399Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-08T18:15:09.487

Modified: 2024-11-21T09:49:35.850

Link: CVE-2024-6409

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-07-08T17:45:07Z

Links: CVE-2024-6409 - Bugzilla

cve-icon OpenCVE Enrichment

No data.