Release date:
2025-08-11 19:40:04 UTC
Description:
- CVE-2018-20685: fix a vulnerability scp client where a malicious server
could bypass intended access restrictions and modify target directory
permissions via crafted filenames
- CVE-2019-6109: fix scp client where a malicious server could manipulate
the client's progress display output due to missing character encoding
- CVE-2019-6111: fix scp client vulnerability that allowed a malicious
server to overwrite arbitrary files in the client's target directory,
including subdirectories, when performing transfers
Updated packages:
-
openssh-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
sha:073af0110f76b1ad40777ff41537ac23067fe290013150e479fec0edb503c5a3
-
openssh-askpass-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
sha:c1680b42ce01f8affa71da83c30900e22a045e2e03cfa6a0129723a7d27f53f8
-
openssh-cavs-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
sha:e769d52cef63c2be7a87a78e2d7bbd84855c897f44600e77d6690812c6b78b53
-
openssh-clients-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
sha:da4423817235a7ff6e58e56f8570b099a233d3772cb6d2596b0470c1515c17de
-
openssh-keycat-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
sha:b2dbfebd70dddc4c902d3d218ecad5865594c4c6a13c51d9a52d52dad0ab11ea
-
openssh-ldap-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
sha:1c66f1e3b1c159a9a321def0fec4ab380511c7b4876bfb4b92a146cf1a4de149
-
openssh-server-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
sha:e29faaee09c8485c0f673879006bf620ae2bf3429bb9b1f5f866b71500f8f2ba
-
openssh-server-sysvinit-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
sha:d0ecb8f07402ad03f569f39d3e9d3dd1183fc1c07c305da6c36c1a0e2af1969a
-
pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els3.i686.rpm
sha:8d60ea7614593f3cfd85fb1f26f0304d20f120c175037b4c32202572dfab24dc
-
pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els3.x86_64.rpm
sha:9a4edcf21d3ee9ad8d798ba6fa73997772fc8600be6e9428f7226bd6d9bc6793
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.