EGI SVG Advisories

Advisory-EGI-SVG-2024-14

‘HIGH’ Risk ANOTHER OpenSSH vulnerability

Date: 2024-07-11 Updated: 2024-08-22

ANOTHER OpenSSH vulnerability

HIGH risk OpenSSH vulnerability due to a signal handler race condition with the possibility of Remote Code Execution. This affects RedHat 9 and derivatives.

IDs AND CVSS SCORE

EGI SVG ID : EGI-SVG-2024-14

CVE ID : CVE-2024-6409

CVSS Score : 7.0 [R 1]

ACTIONS REQUIRED/RECOMMENDED

Sites running vulnerable versions are recommended to update relevant components as soon as possible using information in the references below.

MORE INFORMATION

We are aware that this advisory is being sent only a couple of days after another advisory on OpenSSH (CVE-2024-6387), but it is another vulnerablity which we were not aware of when sending the previous advisory. Sites should be aware that they may require further action beyond those taken to resolve the previous vulnerability.

Some software providers rate as ‘Moderate’ others as ‘High’ risk or ‘Important’. EGI SVG has assessed this as ‘HIGH risk in our environment.

At the time of writing, as far as we are aware no exploit has been published but this could change.

STATUS OF THIS ADVISORY

TLP:CLEAR information - Unlimited distribution

https://advisories.egi.eu/Advisory-EGI-SVG-2024-14

https://advisories.egi.eu/Advisory-SVG-CVE-2024-6409

CONTACT AND OTHER INFORMATION ON SVG


This advisory is subject to the Creative Commons licence 
https://creativecommons.org/licenses/by/4.0/ and
the EGI (https://www.egi.eu/) Software Vulnerability Group 
must be credited. -----------------------------

Comments or questions should be sent to svg-rat at mailman.egi.eu

Vulnerabilities relevant for EGI can be reported at report-vulnerability at egi.eu

(see [R 99] for further details, and other information on SVG)

REFERENCES

CREDITS

EGI SVG was alerted to this vulnerability by both Sebastian Luna Valero and Jan Astalos.