Mageia 2019-0156: openssh security update
Summary
Updated openssh packages fix security vulnerabilities:
Due to missing character encoding in the progress display, the object
name can be used to manipulate the client output, for example to employ
ANSI codes to hide additional files being transferred (CVE-2019-6109).
Due to scp client insufficient input validation in path names sent by
server, a malicious server can do arbitrary file overwrites in target
directory. If the recursive (-r) option is provided, the server can
also manipulate subdirectories as well (CVE-2019-6111).
The check added in this version can lead to regression if the client and
the server have differences in wildcard expansion rules. If the server is
trusted for that purpose, the check can be disabled with a new -T option
to the scp client.
References
- https://bugs.mageia.org/show_bug.cgi?id=24308
- https://www.debian.org/security/2019/dsa-4387
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111
Resolution
MGASA-2019-0156 - Updated openssh packages fix security vulnerabilities
SRPMS
- 6/core/openssh-7.5p1-2.4.mga6