In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output
from the server, a malicious server (or Man-in-The-Middle attacker) can
manipulate the client output, for example to use ANSI control codes to hide
additional files being transferred.
sarnoldopenssh-ssh1 is provided for compatibility with old devices that
cannot be upgraded to modern protocols. Thus we may not provide security
support for this package if doing so would prevent access to equipment.
mdeslaurThe recommended workaround for this issue is to switch to using
sftp instead of scp.

upstream doesn't consider this to be a vulberability, and as of
2020-03-06, there is no upstream fix.
Ubuntu 12.04 ESM (Precise Pangolin):deferred (2020-03-06)
Ubuntu 14.04 ESM (Trusty Tahr):deferred (2020-03-06)
Ubuntu 16.04 LTS (Xenial Xerus):deferred (2020-03-06)
Ubuntu 18.04 LTS (Bionic Beaver):deferred (2020-03-06)
Ubuntu 19.10 (Eoan Ermine):deferred (2020-03-06)
Ubuntu 20.04 (Focal Fossa):deferred (2020-03-06)
Upstream:ignored (frozen on openssh 7.5p)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 19.10 (Eoan Ermine):needs-triage
Ubuntu 20.04 (Focal Fossa):needs-triage
More Information

Updated: 2020-04-24 03:57:14 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)