[CLSA-2025:1754941200] openssh: Fix of 3 CVEs
Type:
security
Severity:
Moderate
Release date:
2025-08-11 19:40:04 UTC
Description:
- CVE-2018-20685: fix a vulnerability scp client where a malicious server could bypass intended access restrictions and modify target directory permissions via crafted filenames - CVE-2019-6109: fix scp client where a malicious server could manipulate the client's progress display output due to missing character encoding - CVE-2019-6111: fix scp client vulnerability that allowed a malicious server to overwrite arbitrary files in the client's target directory, including subdirectories, when performing transfers
Updated packages:
  • openssh-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:073af0110f76b1ad40777ff41537ac23067fe290013150e479fec0edb503c5a3
  • openssh-askpass-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:c1680b42ce01f8affa71da83c30900e22a045e2e03cfa6a0129723a7d27f53f8
  • openssh-cavs-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:e769d52cef63c2be7a87a78e2d7bbd84855c897f44600e77d6690812c6b78b53
  • openssh-clients-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:da4423817235a7ff6e58e56f8570b099a233d3772cb6d2596b0470c1515c17de
  • openssh-keycat-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:b2dbfebd70dddc4c902d3d218ecad5865594c4c6a13c51d9a52d52dad0ab11ea
  • openssh-ldap-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:1c66f1e3b1c159a9a321def0fec4ab380511c7b4876bfb4b92a146cf1a4de149
  • openssh-server-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:e29faaee09c8485c0f673879006bf620ae2bf3429bb9b1f5f866b71500f8f2ba
  • openssh-server-sysvinit-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:d0ecb8f07402ad03f569f39d3e9d3dd1183fc1c07c305da6c36c1a0e2af1969a
  • pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els3.i686.rpm
    sha:8d60ea7614593f3cfd85fb1f26f0304d20f120c175037b4c32202572dfab24dc
  • pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:9a4edcf21d3ee9ad8d798ba6fa73997772fc8600be6e9428f7226bd6d9bc6793
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.