[CLSA-2026:1774528630] openssh: Fix of 3 CVEs
Type:
security
Severity:
Moderate
Release date:
2026-03-26 12:37:14 UTC
Description:
- CVE-2018-20685: fix a vulnerability scp client where a malicious server could bypass intended access restrictions and modify target directory permissions via crafted filenames - CVE-2019-6109: fix scp client where a malicious server could manipulate the client's progress display output due to missing character encoding - CVE-2019-6111: fix scp client vulnerability that allowed a malicious server to overwrite arbitrary files in the client's target directory, including subdirectories, when performing transfers
Updated packages:
  • openssh-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:c7dc5bf9d8d408afce072d0fad3b48436a691d266a9eff9e4a50656e4d36759b
  • openssh-askpass-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:cabcc3cc6a8abb849e3b78b64fa13b813694d5a8e7dbce9152db57f2773650cf
  • openssh-cavs-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:ff94e6b0a3ef519ee34674681c74efa407857a51e8e96db7410514925c05dd18
  • openssh-clients-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:32ac4a032722117092fa7af36fa231c4599e93de45b34aa126e5b4455215cb1c
  • openssh-keycat-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:514534a9b958ac3d4151c102af44bf1dee11e9686b8a54a5e0c9356df7e6dd60
  • openssh-ldap-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:143ece639c77b5adc6d0e89b7b481414fd7c0c28aaaec1957ada7cc44eacbf69
  • openssh-server-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:056804c520937f7d58e5768db5a10a30158de54a203aa0a78f22d19c3eb371d3
  • openssh-server-sysvinit-7.4p1-23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:78c0ceaccb909a5d7aaa4e2553a8a68a8cf5e74a47bfd3aaace7eb9c5420887b
  • pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els3.i686.rpm
    sha:19d52075d0dd20c71f7a640eccb90799d494486e1d82232d3a5cdfd21e9085ea
  • pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els3.x86_64.rpm
    sha:999a52bcac2ecfe58ce01c8f7b682a6d2e868609a72c4cff7670333a48a0f737
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.