openSUSE: 2019:0307-1: moderate: openssh
Description
This update for openssh fixes the following issues: Security vulnerabilities addressed: - CVE-2019-6109: Fixed an character encoding issue in the progress display of the scp client that could be used to manipulate client output, allowing for spoofing during file transfers (bsc#1121816) - CVE-2019-6111: Properly validate object names received by the scp client to prevent arbitrary file overwrites when interacting with a malicious SSH server (bsc#1121821) Other bug fixes and changes: - Handle brace expansion in scp when checking that filenames sent by the server side match what the client requested (bsc#1125687) This update was imported from the SUSE:SLE-15:Update update project.
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.0: zypper in -t patch openSUSE-2019-307=1
Package List
- openSUSE Leap 15.0 (i586 x86_64): openssh-7.6p1-lp150.8.15.2 openssh-cavs-7.6p1-lp150.8.15.2 openssh-cavs-debuginfo-7.6p1-lp150.8.15.2 openssh-debuginfo-7.6p1-lp150.8.15.2 openssh-debugsource-7.6p1-lp150.8.15.2 openssh-fips-7.6p1-lp150.8.15.2 openssh-helpers-7.6p1-lp150.8.15.2 openssh-helpers-debuginfo-7.6p1-lp150.8.15.2 - openSUSE Leap 15.0 (x86_64): openssh-askpass-gnome-7.6p1-lp150.8.15.1 openssh-askpass-gnome-debuginfo-7.6p1-lp150.8.15.1
References
https://www.suse.com/security/cve/CVE-2019-6109.html https://www.suse.com/security/cve/CVE-2019-6111.html https://bugzilla.suse.com/1121816 https://bugzilla.suse.com/1121821 https://bugzilla.suse.com/1125687--