Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 675520 - <net-misc/openssh-7.9_p1-r2: improper check in scp.c:sink() allows malicious servers to bypass access restrictions in scp client (CVE-2018-20685)
Summary: <net-misc/openssh-7.9_p1-r2: improper check in scp.c:sink() allows malicious ...
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
Whiteboard: A3 [glsa+ cve]
Depends on: CVE-2019-6111
Blocks: CVE-2018-20685
  Show dependency tree
Reported: 2019-01-15 17:48 UTC by GLSAMaker/CVETool Bot
Modified: 2020-06-15 19:56 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2019-01-15 17:48:45 UTC
CVE-2018-20685 (
  In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass
  intended access restrictions via the filename of . or an empty filename.
Comment 2 Yury German Gentoo Infrastructure gentoo-dev 2019-03-10 22:10:18 UTC
Since R2 is gone from the tree and R4 is going through stabilization under 675522, making this bug dependent.
Comment 3 GLSAMaker/CVETool Bot gentoo-dev 2019-03-20 13:37:04 UTC
This issue was resolved and addressed in
 GLSA 201903-16 at
by GLSA coordinator Aaron Bauman (b-man).