First published: Mon Jul 01 2024(Updated: )
The OpenSSH version as shipped with Red Hat Enterprise Linux 9 is vulnerable to a signal handler race condition on cleanup_exit() function which introduces the same vulnerability as <a href="https://access.redhat.com/security/cve/CVE-2024-6387">CVE-2024-6387</a> in the unprivileged child of the SSHD server. This vulnerability only affects the versions of OpenSSH shipped with Red Hat Enterprise Linux 9.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSH | =9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2295085 is classified as high due to the potential for a signal handler race condition.
To mitigate REDHAT-BUG-2295085, update to the latest patched version of OpenSSH provided by Red Hat.
REDHAT-BUG-2295085 affects OpenSSH version 9 as shipped with Red Hat Enterprise Linux 9.
The vulnerability in REDHAT-BUG-2295085 is caused by a race condition in the cleanup_exit() function of the OpenSSH implementation.
Yes, REDHAT-BUG-2295085 is associated with the CVE-2024-6387 vulnerability.