Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-61984

Опубликовано: 06 окт. 2025
Источник: debian
EPSS Низкий

Описание

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensshfixed1:10.1p1-1package
opensshno-dsatrixiepackage
opensshno-dsabookwormpackage
opensshpostponedbullseyepackage

Примечания

  • https://www.openwall.com/lists/oss-security/2025/10/06/1

  • https://dgl.cx/2025/10/bash-a-newline-ssh-proxycommand-cve-2025-61984

EPSS

Процентиль: 0%
0.00007
Низкий

Связанные уязвимости

CVSS3: 3.6
ubuntu
2 месяца назад

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

CVSS3: 3.6
nvd
2 месяца назад

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

CVSS3: 3.6
msrc
2 месяца назад

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

suse-cvrf
около 1 месяца назад

Security update for openssh

CVSS3: 3.6
github
2 месяца назад

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

EPSS

Процентиль: 0%
0.00007
Низкий