First published: Mon Mar 04 2019(Updated: )
USN-3885-1 fixed vulnerabilities in OpenSSH. It was discovered that the fix for CVE-2019-6111 turned out to be incomplete. This update fixes the problem. Original advisory details: Harry Sintonen discovered multiple issues in the OpenSSH scp utility. If a user or automated system were tricked into connecting to an untrusted server, a remote attacker could possibly use these issues to write to arbitrary files, change directory permissions, and spoof client output.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/openssh-client | <1:7.7p1-4ubuntu0.3 | 1:7.7p1-4ubuntu0.3 |
=18.10 | ||
All of | ||
ubuntu/openssh-client | <1:7.6p1-4ubuntu0.3 | 1:7.6p1-4ubuntu0.3 |
=18.04 | ||
All of | ||
ubuntu/openssh-client | <1:7.2p2-4ubuntu2.8 | 1:7.2p2-4ubuntu2.8 |
=16.04 | ||
All of | ||
ubuntu/openssh-client | <1:6.6p1-2ubuntu2.13 | 1:6.6p1-2ubuntu2.13 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenSSH vulnerability is USN-3885-2.
The Ubuntu versions 18.10, 18.04, 16.04, and 14.04 with the openssh-client package versions 1:7.7p1-4ubuntu0.3, 1:7.6p1-4ubuntu0.3, 1:7.2p2-4ubuntu2.8, and 1:6.6p1-2ubuntu2.13 respectively are affected by this vulnerability.
The severity of the OpenSSH vulnerability is not specified in the provided information.
To fix the OpenSSH vulnerability, update the openssh-client package to the corresponding fixed versions provided by Ubuntu.
You can find more information about this OpenSSH vulnerability in the official Ubuntu Security Notices: USN-3885-1.