{"id":"CVE-2024-6409","details":"A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.","modified":"2026-04-02T12:25:54.560773Z","published":"2024-07-08T18:15:09.487Z","related":["ALSA-2024:4457"],"references":[{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2024-6409"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/08/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/09/5"},{"type":"WEB","url":"https://explore.alas.aws.amazon.com/CVE-2024-6409.html"},{"type":"WEB","url":"https://ubuntu.com/security/CVE-2024-6409"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/09/2"},{"type":"WEB","url":"https://sig-security.rocky.page/issues/CVE-2024-6409/"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-6409.html"},{"type":"WEB","url":"https://security-tracker.debian.org/tracker/CVE-2024-6409"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/10/1"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/10/2"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4960"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:5444"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240712-0003/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4716"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4457"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4613"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4910"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4955"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295085"},{"type":"REPORT","url":"https://bugzilla.suse.com/show_bug.cgi?id=1227217"},{"type":"FIX","url":"https://github.com/openela-main/openssh/commit/c00da7741d42029e49047dd89e266d91dcfbffa0"},{"type":"ARTICLE","url":"https://almalinux.org/blog/2024-07-09-cve-2024-6409/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openela-main/openssh","events":[{"introduced":"0"},{"fixed":"c00da7741d42029e49047dd89e266d91dcfbffa0"}]}],"versions":["imports/el9/openssh-8.7p1-30.el9_2","imports/el9/openssh-8.7p1-34.el9","imports/el9/openssh-8.7p1-34.el9_3.3","imports/el9/openssh-8.7p1-38.el9","imports/el9/openssh-8.7p1-38.el9_4.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-6409.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}]}