
A significant vulnerability has been discovered in OpenSSH, a widely used secure communications protocol. Researchers at the cybersecurity firm Qualys identified the flaw, which is designated as CVE-2024-6409. The vulnerability, found in RHEL 9's versions 8.7p1 and 8.8p1, and unmaintained Fedora, allows for remote code execution (RCE) via a race condition in the privileged separation (privsep) child process. This issue has sparked considerable concern within the security community, especially since active exploits have already been detected. The flaw is distinct from another recent vulnerability, CVE-2024-6387, but shares some similarities.



🚨 New OpenSSH #vulnerability (CVE-2024-6409) found in RHEL 9's versions 8.7p1 & 8.8p1, allowing RCE via race condition in privsep child process. Read: https://t.co/eqKHCNGHoQ ⚠️ Active exploits detected! This bug is distinct from CVE-2024-6387 but shares similarities.
CVE-2024-6409: OpenSSH: Possible remote code execution in privsep child due to a race condition in signal handling https://t.co/tibbmZl6Hv
Another remote code execution in OpenSSH (RHEL, and unmaintained Fedora) by @solardiz https://t.co/aY8uSgftBM https://t.co/t9OLlFbuNo