Únete a nosotros el 14 de diciembre para el AlmaLinux Day: ¡Tokio! Leer más

AlmaLinux OS 9 Patching for CVE-2024-6409

profile
Andrew Lukoshko

Release Engineering Lead

AlmaLinux OS 9 is impacted by a newly disclosed vulnerability in OpenSSH’s server (sshd) in glibc-based Linux systems similiar to last week’s CVE-2024-6387. The new vulnerability has been assigned the identifier CVE-2024-6409. It involves a signal handler race condition, which could expose your system to potential security risks.

At AlmaLinux, we place security first and we are committed to delivering patches to our users as quickly as possible, especially when our community needs them. The decision to build the update and push the package to production without waiting for a CentOS Stream or RHEL update was made by our newly-formed technical steering committee, ALESCo.

The OpenSSH patch for CVE-2024-6409 has been released and is available for AlmaLinux OS 9 users.

Update the OpenSSH package to protect your system against this issue:

sudo dnf --refresh upgrade openssh

Confirm the updated version has been installed. Our initial patch was included in openssh-8.7p1-38.el9_4.1.alma.1. After RHEL updated to include the upstream patch, we updated again to ensure we were 100% in line with RHEL. The package you’re looking for is listed on the CVE-2024-6409 errata page

rpm -q openssh

Stay Informed

Remaining aware of these vulnerabilities and acting quickly can keep your system and data safe. Follow AlmaLinux Blog, join the Mattermost Community Chat, and subscribe to Announce and Security Mailing Lists to stay informed and updated.

¡Manténgase al día!