oss-sec mailing list archives

Re: CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems


From: Pete Allor <pallor () redhat com>
Date: Wed, 10 Jul 2024 11:06:05 -0400

Other records for the same CVE can also be posted to CVE.org and listed on
their website with a link for completeness.

Under CVE rules, Red Hat can only assign a CVE for issues within our scope,
which for most CNAs means their software.   RH has on occasion, provided a
CVE for upstream projects which are not covered by another CNA.  That is
really about a coordination point between multiple parties.

When considering becoming a CNA, it should not be for an occasional CVE so
becoming a CNA should be considered if you have a good number per year AND
you have the people to do that work regularly.

I can offer that if you wish for Red Hat to add to this record, then we
would be glad to assist.   Please send a DM to secalert () redhat com and we
will work on it.

Pete

On Wed, Jul 10, 2024 at 10:57 AM Nick Tait <ntait () redhat com> wrote:

Damian, in general when there is incorrect data on any of Red Hat's CVE
pages the best place to request a fix is secalert () redhat com.

In this case we are paying attention to this mailing list and have
incorporated some suggestions. I can help address any remaining cleanups.

Has OpenSSH ever considered becoming a CNA?

~Nick

On Tue, Jul 9, 2024 at 4:51 PM Solar Designer <solar () openwall com> wrote:

On Tue, Jul 09, 2024 at 09:52:58AM +1000, Damien Miller wrote:
On Mon, 8 Jul 2024, Solar Designer wrote:
Today is the coordinated release date to publicly disclose a related
issue I found during review of Qualys' findings, with further
analysis
by Qualys.  My summary is:

CVE-2024-6409: OpenSSH: Possible remote code execution in privsep
child
due to a race condition in signal handling

As an aside, who wrote the text of
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6409 ?

I don't know for sure, but I guess someone from Red Hat did since the
CVE was assigned by them as a CNA.  Also, the description is the same as
what's in Red Hat Bugzilla.

It's disappointing that this CVE states that this is a vulnerability
in OpenSSH sshd, and fails to make clear that this only affects Redhat
versions and users of their downstream patch.

This was in the title, just not in the description.  And now I see I did
it the other way around in my oss-security posting - should have been
more careful to include this information in both the suggested title and
in the description - sorry about that.  Meanwhile, looks like the
CVE-2024-6409 record has been updated today, perhaps in response to your
message, and now says Red Hat Enterprise Linux 9 also in the description.

This follows another critical failure to properly issue CVEs for
OpenSSH:
CVE-2024-6387 only lists CPEs for Redhat systems as affected (see the
JSON dump of the entry: https://cveawg.mitre.org/api/cve/CVE-2024-6387
)

The current revision (also updated today) starts with:

      "affected": [
        {
          "repo": "https://anongit.mindrot.org/openssh.git";,
          "versions": [
            {
              "status": "affected",
              "version": "8.5p1",
              "versionType": "custom",
              "lessThanOrEqual": "9.7p1"
            }
          ],
          "packageName": "OpenSSH",
          "collectionURL": "https://www.openssh.com/";,
          "defaultStatus": "unaffected"
        },

and only then proceeds to give CPEs for Red Hat products.

This means that anyone using automation that consumes CVEs for
detecting
vulnerabilities will be left exposed.

Does the above look good enough now, or should there also be a CPE for
upstream OpenSSH?

Moreover, the explanatory text for CVE-2024-6387 is also extremely
lacking.
It fails to explain the consequence of the vulnerability (unauth RCE)
and
just talks about mechanism.

This is still the case, and this CVE was also assigned by Red Hat (in
response to requests by Qualys and me in the distros list discussion),
and the description is also the same as in Red Hat Bugzilla, so should
probably be first improved in a database Red Hat uses internally.

I don't know if it's in anyone on this list's ability to get these
fixed, but IMO they are serious failures of the CVE process that make
it near-useless for consumers of this information.

Apparently, someone in here noticed and started making edits.

Alexander




Current thread: