Bug 49097 - openssh: Multiple issues (4.2)
openssh: Multiple issues (4.2)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.2
All Linux
: P3 normal (vote)
: UCS 4.2-5-errata
Assigned To: Quality Assurance
Philipp Hahn
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-03-26 08:07 CET by Quality Assurance
Modified: 2019-03-27 16:44 CET (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 5.3 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2019-03-26 08:07:09 CET
New Debian openssh 1:6.7p1-5+deb8u8 fixes:
This update addresses the following issues:
* scp client improper directory name validation (CVE-2018-20685)
* Missing character encoding in progress display allows for spoofing of scp  client output (CVE-2019-6109)
* Improper validation of object names allows malicious server to overwrite  files via scp client (CVE-2019-6111)
Comment 1 Quality Assurance univentionstaff 2019-03-26 08:32:07 CET
--- mirror/ftp/4.2/unmaintained/4.2-5/source/openssh_6.7p1-5+deb8u7.dsc
+++ apt/ucs_4.2-0-errata4.2-5/source/openssh_6.7p1-5+deb8u8.dsc
@@ -1,3 +1,14 @@
+1:6.7p1-5+deb8u8 [Fri, 01 Feb 2019 00:45:09 +0100] Mike Gabriel <sunweaver@debian.org>:
+
+  * Non-maintainer upload by the LTS Team.
+  * CVE-2018-20685: Disallow empty incoming filename or ones that refer
+    to the current directory; based on report/patch from Harry Sintonen.
+  * CVE-2019-6109: Sanitize scp filenames via snmprintf. To do this we move
+    the progressmeter formatting outside of signal handler context and have the
+    atomicio callback called for EINTR, too.
+  * CVE-2019-6111: Check in scp client that filenames sent during remote->local
+    directory copies satisfy the wildcard specified by the user.
+
 1:6.7p1-5+deb8u7 [Wed, 12 Sep 2018 13:23:59 +0200] Santiago Ruano Rincón <santiagorr@riseup.net>:
 
   * Add debian/patches/CVE-2016-1908-3.patch: client_x11_get_proto: check if

<http://10.200.17.11/4.2-5/#2247060911681047968>
Comment 2 Philipp Hahn univentionstaff 2019-03-26 15:30:54 CET
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

[4.2-5] 42ae146ce4 Bug #49097: openssh 1:6.7p1-5+deb8u8
 doc/errata/staging/openssh.yaml | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
Comment 3 Arvid Requate univentionstaff 2019-03-27 16:44:55 CET
<http://errata.software-univention.de/ucs/4.2/624.html>