The OpenSSH version as shipped with Red Hat Enterprise Linux 9 is vulnerable to a signal handler race condition on cleanup_exit() function which introduces the same vulnerability as CVE-2024-6387 in the unprivileged child of the SSHD server. This vulnerability only affects the versions of OpenSSH shipped with Red Hat Enterprise Linux 9.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:4457 https://access.redhat.com/errata/RHSA-2024:4457
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:4716 https://access.redhat.com/errata/RHSA-2024:4716
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.16 Via RHSA-2024:4613 https://access.redhat.com/errata/RHSA-2024:4613
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:4910 https://access.redhat.com/errata/RHSA-2024:4910
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.15 Via RHSA-2024:4955 https://access.redhat.com/errata/RHSA-2024:4955
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.14 Via RHSA-2024:4960 https://access.redhat.com/errata/RHSA-2024:4960
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.13 Via RHSA-2024:5444 https://access.redhat.com/errata/RHSA-2024:5444
(In reply to errata-xmlrpc from comment #15) > This issue has been addressed in the following products: > > Red Hat OpenShift Container Platform 4.13 > https://mapquest-directions.org > Via RHSA-2024:5444 https://access.redhat.com/errata/RHSA-2024:5444 Thanks for the update!