-
Security Vulnerability
-
Resolution: Fixed
-
Normal
-
None
-
None
-
None
CVE-2020-14145
The client side in OpenSSH 5.7 through 8.3 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client).
CVE-2020-15778
scp in OpenSSH through 8.3p1 allows command injection in scp.c remote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
But i try local bump openssh to new version and i have problems. Probably with ebuild.
Gentoo have new eclasses (user-info) in openssh ebuild.
This update teke more work and test
Additional with this task we can resolve bug FL-6656
- is duplicated by
-
FL-7807 net-misc/openssh-8.1_p1-r1 - high and medium severity vulnerabilities
- Closed