A flaw has been discovered in OpenSSH which could allow a remote attacker to create zero-length files.
| Package | net-misc/openssh on all architectures | 
|---|---|
| Affected versions | < 7.5_p1-r3 | 
| Unaffected versions | >= 7.5_p1-r3 | 
OpenSSH is a complete SSH protocol implementation that includes SFTP client and server support.
The process_open function in sftp-server.c in OpenSSH did not properly prevent write operations in readonly mode.
A remote attacker could cause the creation of zero-length files.
There is no known workaround at this time.
All OpenSSH users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/openssh-7.5_p1-r3"
      Release date
      
      January 07, 2018
    
      Latest revision
      
      January 07, 2018: 1
    
      Severity
      
      normal
    
      Exploitable
      
      remote
    
Bugzilla entries