• CVE-2024-6409

发布时间: 2024年7月19日

修改时间: 2024年8月19日

概要

A signal handler race condition vulnerability was found in OpenSSH s server (sshd) in Red Hat Enterprise Linux 9, where a client does not authenticate within LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions), then sshd s SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). This issue leaves it vulnerable to a signal handler race condition on the cleanup_exit() function, which introduces the same vulnerability as CVE-2024-6387 in the unprivileged child of the SSHD server. As a consequence of a successful attack, in the worst case scenario, the attacker may be able to perform a remote code execution (RCE) within unprivileged user running the sshd server. This vulnerability affects only the sshd server shipped with Red Hat Enterprise Linux 9, while upstream versions of sshd are not impact by this flaw.

CVSS v3 指标

NVD openEuler
Confidentiality Low
Attack Vector Network
CVSS评分 N/A 7.0
Attack Complexity High
Privileges Required None
Scope Unchanged
Integrity Low
User Interaction None
Availability High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-3134 openssh security update 2024年7月19日

影响产品

产品 状态
KY3.5.2 openssh Fixed
KY3.5.3 openssh Fixed