Bugzilla – Bug 1121818
VUL-0: CVE-2019-6110: openssh-openssl1,openssh,putty: scp client spoofing via stderr
Last modified: 2024-07-03 08:03:39 UTC
4. CWE-451: scp client spoofing via stderr [CVE-2019-6110] Due to accepting and displaying arbitrary stderr output from the scp server, a malicious server can manipulate the client output, for example to employ ANSI codes to hide additional files being transferred. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6110 http://seclists.org/oss-sec/2019/q1/63 https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://sintonen.fi/advisories/scp-name-validator.patch
on openSUSE: also putty(pscp).
SUSE-SU-2019:0125-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1121571,1121816,1121818,1121821 CVE References: CVE-2018-20685,CVE-2019-6109,CVE-2019-6110,CVE-2019-6111 Sources used: SUSE Linux Enterprise Server 12-SP1-LTSS (src): openssh-6.6p1-54.26.1, openssh-askpass-gnome-6.6p1-54.26.1 SUSE Linux Enterprise Server 12-LTSS (src): openssh-6.6p1-54.26.1, openssh-askpass-gnome-6.6p1-54.26.1
SUSE-SU-2019:0126-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1121571,1121816,1121818,1121821 CVE References: CVE-2018-20685,CVE-2019-6109,CVE-2019-6110,CVE-2019-6111 Sources used: SUSE Linux Enterprise Module for Server Applications 15 (src): openssh-7.6p1-9.13.1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src): openssh-7.6p1-9.13.1 SUSE Linux Enterprise Module for Desktop Applications 15 (src): openssh-askpass-gnome-7.6p1-9.13.1 SUSE Linux Enterprise Module for Basesystem 15 (src): openssh-7.6p1-9.13.1
SUSE-SU-2019:13931-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1121571,1121816,1121818,1121821 CVE References: CVE-2018-20685,CVE-2019-6109,CVE-2019-6110,CVE-2019-6111 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): openssh-6.6p1-36.12.1, openssh-askpass-gnome-6.6p1-36.12.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): openssh-6.6p1-36.12.1, openssh-askpass-gnome-6.6p1-36.12.1
SUSE-SU-2019:0132-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1121571,1121816,1121818,1121821 CVE References: CVE-2018-20685,CVE-2019-6109,CVE-2019-6110,CVE-2019-6111 Sources used: SUSE OpenStack Cloud 7 (src): openssh-7.2p2-74.35.1, openssh-askpass-gnome-7.2p2-74.35.1 SUSE Linux Enterprise Server for SAP 12-SP2 (src): openssh-7.2p2-74.35.1, openssh-askpass-gnome-7.2p2-74.35.1 SUSE Linux Enterprise Server 12-SP4 (src): openssh-7.2p2-74.35.1, openssh-askpass-gnome-7.2p2-74.35.1 SUSE Linux Enterprise Server 12-SP3 (src): openssh-7.2p2-74.35.1, openssh-askpass-gnome-7.2p2-74.35.1 SUSE Linux Enterprise Server 12-SP2-LTSS (src): openssh-7.2p2-74.35.1, openssh-askpass-gnome-7.2p2-74.35.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): openssh-7.2p2-74.35.1, openssh-askpass-gnome-7.2p2-74.35.1 SUSE Linux Enterprise Desktop 12-SP4 (src): openssh-7.2p2-74.35.1, openssh-askpass-gnome-7.2p2-74.35.1 SUSE Linux Enterprise Desktop 12-SP3 (src): openssh-7.2p2-74.35.1, openssh-askpass-gnome-7.2p2-74.35.1 SUSE Enterprise Storage 4 (src): openssh-7.2p2-74.35.1, openssh-askpass-gnome-7.2p2-74.35.1 SUSE CaaS Platform ALL (src): openssh-7.2p2-74.35.1 SUSE CaaS Platform 3.0 (src): openssh-7.2p2-74.35.1 OpenStack Cloud Magnum Orchestration 7 (src): openssh-7.2p2-74.35.1
openSUSE-SU-2019:0091-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1121571,1121816,1121818,1121821 CVE References: CVE-2018-20685,CVE-2019-6109,CVE-2019-6110,CVE-2019-6111 Sources used: openSUSE Leap 15.0 (src): openssh-7.6p1-lp150.8.9.1, openssh-askpass-gnome-7.6p1-lp150.8.9.1
openSUSE-SU-2019:0093-1: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1121571,1121816,1121818,1121821 CVE References: CVE-2018-20685,CVE-2019-6109,CVE-2019-6110,CVE-2019-6111 Sources used: openSUSE Leap 42.3 (src): openssh-7.2p2-29.1, openssh-askpass-gnome-7.2p2-29.1
We reverted the fixes for the recent scp issues (CVE-2019-6109, CVE-2019-6110, CVE-2019-6111) due to the reported regression (bug 1123028) causing a change of scp's behavior. None of the patches came from upstream and there could be more incompatibilities lurking. Upstream assessment (https://lists.gt.net/openssh/dev/73013#73013) of CVE-2019-6110: "We don't consider the report relating to stderr to be a vulnerability - lots of stuff depends on stderr being present (e.g. login warning banners that some people inexplicably love) and it's impractical for scp to selectively process them. The machine you just logged into can print junk to your screen, so what?"
SUSE-SU-2019:0125-2: An update that fixes four vulnerabilities is now available. Category: security (important) Bug References: 1121571,1121816,1121818,1121821 CVE References: CVE-2018-20685,CVE-2019-6109,CVE-2019-6110,CVE-2019-6111 Sources used: SUSE Linux Enterprise Server for SAP 12-SP1 (src): openssh-6.6p1-54.26.1, openssh-askpass-gnome-6.6p1-54.26.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
missing for SUSE:SLE-11-SP3:Update/openssh-openssl1