{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T03:23:56.778","vulnerabilities":[{"cve":{"id":"CVE-2024-6409","sourceIdentifier":"secalert@redhat.com","published":"2024-07-08T18:15:09.487","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server."},{"lang":"es","value":"Se encontró una vulnerabilidad de condición de ejecución del controlador de señales en el servidor de OpenSSH (sshd), donde un cliente no se autentica dentro de los segundos de LoginGraceTime (120 de forma predeterminada, 600 en versiones anteriores de OpenSSH), luego se llama al controlador SIGALRM de sshd de forma asincrónica. Sin embargo, este controlador de señales llama a varias funciones que no son seguras para señales asíncronas, por ejemplo, syslog(). Este problema lo deja vulnerable a una condición de ejecución del controlador de señales en la función cleanup_exit(), que introduce la misma vulnerabilidad que CVE-2024-6387 en el hijo sin privilegios del servidor SSHD."}],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H","baseScore":7.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":4.7}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-364"}]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2024:4457","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:4613","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:4716","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:4910","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:4955","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:4960","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2024:5444","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/security/cve/CVE-2024-6409","source":"secalert@redhat.com"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295085","source":"secalert@redhat.com"},{"url":"http://www.openwall.com/lists/oss-security/2024/07/08/2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2024/07/09/2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2024/07/09/5","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2024/07/10/1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2024/07/10/2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://access.redhat.com/errata/RHSA-2024:4457","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://access.redhat.com/errata/RHSA-2024:4613","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://access.redhat.com/errata/RHSA-2024:4716","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://access.redhat.com/security/cve/CVE-2024-6409","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://almalinux.org/blog/2024-07-09-cve-2024-6409/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2295085","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.suse.com/show_bug.cgi?id=1227217","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://explore.alas.aws.amazon.com/CVE-2024-6409.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/openela-main/openssh/commit/c00da7741d42029e49047dd89e266d91dcfbffa0","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security-tracker.debian.org/tracker/CVE-2024-6409","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security.netapp.com/advisory/ntap-20240712-0003/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://sig-security.rocky.page/issues/CVE-2024-6409/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://ubuntu.com/security/CVE-2024-6409","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.suse.com/security/cve/CVE-2024-6409.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}