Bugzilla – Bug 1226642
VUL-0: CVE-2024-6387: openssh: regression of CVE-2006-5051
Last modified: 2024-07-17 16:30:04 UTC
*** Bug 1226641 has been marked as a duplicate of this bug. ***
CRD: 2024-07-01 8:00UTC
I've tried backporting the large fix but it needs many changes (also in other patches since it really touches many things) so, since the CVE will be released so soon, I've submitted the quick fix to SLE15 SP6 (in https://build.suse.de/request/show/336976) . I will now prepare also the quick fix to SLE15 SP3 and will continue working on the larger fix later.
is public https://www.openwall.com/lists/oss-security/2024/07/01/1
FTR, SLE-15 SP3 has openssh 8.4 which I checked is not affected by this since the signal handler doesn't do any logging in that version (it's defined out)
SUSE-SU-2024:2275-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1226642 CVE References: CVE-2024-6387 Maintenance Incident: [SUSE:Maintenance:34525](https://smelt.suse.de/incident/34525/) Sources used: openSUSE Leap 15.6 (src): openssh-askpass-gnome-9.6p1-150600.6.3.1, openssh-9.6p1-150600.6.3.1 Basesystem Module 15-SP6 (src): openssh-9.6p1-150600.6.3.1 Desktop Applications Module 15-SP6 (src): openssh-askpass-gnome-9.6p1-150600.6.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:2275-2: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1226642 CVE References: CVE-2024-6387 Maintenance Incident: [SUSE:Maintenance:34525](https://smelt.suse.de/incident/34525/) Sources used: openSUSE Leap 15.6 (src): openssh-9.6p1-150600.6.3.1, openssh-askpass-gnome-9.6p1-150600.6.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.