CVE-2019-6110

Priority
Description
In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output
from the server, a malicious server (or Man-in-The-Middle attacker) can
manipulate the client output, for example to use ANSI control codes to hide
additional files being transferred.
Notes
 sarnold> openssh-ssh1 is provided for compatibility with old devices that
  cannot be upgraded to modern protocols. Thus we may not provide security
  support for this package if doing so would prevent access to equipment.
 mdeslaur>
 mdeslaur> The recommended workaround for this issue is to switch to using
 mdeslaur> sftp instead of scp.
 mdeslaur>
 mdeslaur> Per https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037475.html
 mdeslaur> upstream doesn't consider this to be a vulberability, and as of
 mdeslaur> 2019-01-31, there is no upstream fix.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):deferred (2019-01-31)
Ubuntu 14.04 LTS (Trusty Tahr):deferred (2019-01-31)
Ubuntu 16.04 LTS (Xenial Xerus):deferred (2019-01-31)
Ubuntu 18.04 LTS (Bionic Beaver):deferred (2019-01-31)
Ubuntu 18.10 (Cosmic Cuttlefish):deferred (2019-01-31)
Ubuntu 19.04 (Disco Dingo):deferred (2019-01-31)
Ubuntu 19.10 (Eoan):deferred (2019-01-31)
Package
Upstream:ignored (frozen on openssh 7.5p)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 18.10 (Cosmic Cuttlefish):needs-triage
Ubuntu 19.04 (Disco Dingo):needs-triage
Ubuntu 19.10 (Eoan):needs-triage
More Information

Updated: 2019-04-22 21:37:37 UTC (commit 750f6738e68600bdf0b7c7ef543b49378c330e4e)