Red Hat Security Advisory 2019-3702-01 - OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server. Character encoding and input validation flaws were addressed.
109adad504963c35a3d9c8b030f02e7758216f3beb34099c5e035ce79cc05780
Gentoo Linux Security Advisory 201903-16 - Multiple vulnerabilities have been found in OpenSSH, the worst of which could allow a remote attacker to gain unauthorized access. Versions less than 7.9_p1-r4 are affected.
d68beb4aab2e5a86879d48afdedd8d8a52f988a08fb98a1e281194756651b347
Ubuntu Security Notice 3885-2 - USN-3885-1 fixed vulnerabilities in OpenSSH. It was discovered that the fix for CVE-2019-6111 turned out to be incomplete. This update fixes the problem. Harry Sintonen discovered multiple issues in the OpenSSH scp utility. If a user or automated system were tricked into connecting to an untrusted server, a remote attacker could possibly use these issues to write to arbitrary files, change directory permissions, and spoof client output. Various other issues were also addressed.
5400ce629e7b76b1cd286ddd76665cc5261eb4947ec09c7df32e8af543782b46
Debian Linux Security Advisory 4387-2 - It was found that a security update (DSA-4387-1) of OpenSSH, an implementation of the SSH protocol suite, was incomplete. This update did not completely fix CVE-2019-6111, an arbitrary file overwrite vulnerability in the scp client implementing the SCP protocol.
854f90e3cf9593b95c38215f44e76cc70383ccc8c8e7b1e4dc3f3da3b5467a8d
Debian Linux Security Advisory 4387-1 - Harry Sintonen from F-Secure Corporation discovered multiple vulnerabilities in OpenSSH, an implementation of the SSH protocol suite. All the vulnerabilities are in found in the scp client implementing the SCP protocol.
6c0fb736b4beddde6c918aa8b4223d25be2803590c6188c24970d558ae469ec0
SCP clients have an issue where additional files can be copied over without your knowledge.
2e1bec721a2818585cbf5ac96d1462844829f979b0d82bb420fdda7eae192719
Many scp clients fail to verify if the objects returned by the scp server match those it asked for. This issue dates back to 1983 and rcp, on which scp is based. A separate flaw in the client allows the target directory attributes to be changed arbitrarily. Finally, two vulnerabilities in clients may allow server to spoof the client output.
7fa072fc8f371c8cc4668eb863810286b6651faaf3b8efdcdeee1bc7d0a40099