CVE-2018-20685

Priority
Description
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass
intended access restrictions via the filename of . or an empty filename.
The impact is modifying the permissions of the target directory on the
client side.
Notes
 sarnold> openssh-ssh1 is provided for compatibility with old devices that
  cannot be upgraded to modern protocols. Thus we may not provide security
  support for this package if doing so would prevent access to equipment.
 mdeslaur>
 mdeslaur> The recommended workaround for this issue is to switch to using
 mdeslaur> sftp instead of scp.
Assigned-to
mdeslaur
Package
Upstream:released (1:7.9p1-5)
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 LTS (Trusty Tahr):released (1:6.6p1-2ubuntu2.12)
Ubuntu 16.04 LTS (Xenial Xerus):released (1:7.2p2-4ubuntu2.7)
Ubuntu 18.04 LTS (Bionic Beaver):released (1:7.6p1-4ubuntu0.2)
Ubuntu 18.10 (Cosmic Cuttlefish):released (1:7.7p1-4ubuntu0.2)
Ubuntu 19.04 (Disco Dingo):released (1:7.9p1-5)
Patches:
Upstream:https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2
Upstream:https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h
Package
Upstream:ignored (frozen on openssh 7.5p)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 18.10 (Cosmic Cuttlefish):needs-triage
Ubuntu 19.04 (Disco Dingo):needs-triage
More Information

Updated: 2019-02-07 19:14:24 UTC (commit 75109f6bbc43cc1613c5690fbb8742eb1b6d063b)