oss-sec mailing list archives

Re: CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems


From: Damien Miller <djm () mindrot org>
Date: Tue, 9 Jul 2024 09:52:58 +1000 (AEST)

On Mon, 8 Jul 2024, Solar Designer wrote:

Hi,

Today is the coordinated release date to publicly disclose a related
issue I found during review of Qualys' findings, with further analysis
by Qualys.  My summary is:

CVE-2024-6409: OpenSSH: Possible remote code execution in privsep child
due to a race condition in signal handling

As an aside, who wrote the text of
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6409 ?

It's disappointing that this CVE states that this is a vulnerability
in OpenSSH sshd, and fails to make clear that this only affects Redhat
versions and users of their downstream patch.

This follows another critical failure to properly issue CVEs for OpenSSH:
CVE-2024-6387 only lists CPEs for Redhat systems as affected (see the
JSON dump of the entry: https://cveawg.mitre.org/api/cve/CVE-2024-6387 )

This means that anyone using automation that consumes CVEs for detecting
vulnerabilities will be left exposed.

Moreover, the explanatory text for CVE-2024-6387 is also extremely lacking.
It fails to explain the consequence of the vulnerability (unauth RCE) and
just talks about mechanism.

I don't know if it's in anyone on this list's ability to get these
fixed, but IMO they are serious failures of the CVE process that make
it near-useless for consumers of this information.

-d


Current thread: