High severity7.0NVD Advisory· Published Jul 8, 2024· Updated Apr 15, 2026
CVE-2024-6409
CVE-2024-6409
Description
A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.
Patches
1c00da7741d42Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
23- www.openwall.com/lists/oss-security/2024/07/08/2nvd
- www.openwall.com/lists/oss-security/2024/07/09/2nvd
- www.openwall.com/lists/oss-security/2024/07/09/5nvd
- www.openwall.com/lists/oss-security/2024/07/10/1nvd
- www.openwall.com/lists/oss-security/2024/07/10/2nvd
- access.redhat.com/errata/RHSA-2024:4457nvd
- access.redhat.com/errata/RHSA-2024:4613nvd
- access.redhat.com/errata/RHSA-2024:4716nvd
- access.redhat.com/errata/RHSA-2024:4910nvd
- access.redhat.com/errata/RHSA-2024:4955nvd
- access.redhat.com/errata/RHSA-2024:4960nvd
- access.redhat.com/errata/RHSA-2024:5444nvd
- access.redhat.com/security/cve/CVE-2024-6409nvd
- almalinux.org/blog/2024-07-09-cve-2024-6409/nvd
- bugzilla.redhat.com/show_bug.cginvd
- bugzilla.suse.com/show_bug.cginvd
- explore.alas.aws.amazon.com/CVE-2024-6409.htmlnvd
- github.com/openela-main/openssh/commit/c00da7741d42029e49047dd89e266d91dcfbffa0nvd
- security-tracker.debian.org/tracker/CVE-2024-6409nvd
- security.netapp.com/advisory/ntap-20240712-0003/nvd
- sig-security.rocky.page/issues/CVE-2024-6409/nvd
- ubuntu.com/security/CVE-2024-6409nvd
- www.suse.com/security/cve/CVE-2024-6409.htmlnvd
News mentions
0No linked articles in our index yet.