On Mon, 8 Jul 2024, Solar Designer wrote:

> Hi,
> 
> Today is the coordinated release date to publicly disclose a related
> issue I found during review of Qualys' findings, with further analysis
> by Qualys.  My summary is:
> 
> CVE-2024-6409: OpenSSH: Possible remote code execution in privsep child
> due to a race condition in signal handling

As an aside, who wrote the text of
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6409 ?

It's disappointing that this CVE states that this is a vulnerability
in OpenSSH sshd, and fails to make clear that this only affects Redhat
versions and users of their downstream patch.

This follows another critical failure to properly issue CVEs for OpenSSH:
CVE-2024-6387 only lists CPEs for Redhat systems as affected (see the
JSON dump of the entry: https://cveawg.mitre.org/api/cve/CVE-2024-6387 )

This means that anyone using automation that consumes CVEs for detecting
vulnerabilities will be left exposed.

Moreover, the explanatory text for CVE-2024-6387 is also extremely lacking.
It fails to explain the consequence of the vulnerability (unauth RCE) and
just talks about mechanism.

I don't know if it's in anyone on this list's ability to get these
fixed, but IMO they are serious failures of the CVE process that make
it near-useless for consumers of this information.

-d

Reply via email to