Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-61984

Опубликовано: 06 окт. 2025
Источник: debian

Описание

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensshfixed1:10.1p1-1package
opensshno-dsatrixiepackage
opensshno-dsabookwormpackage
opensshpostponedbullseyepackage

Примечания

  • https://www.openwall.com/lists/oss-security/2025/10/06/1

  • https://dgl.cx/2025/10/bash-a-newline-ssh-proxycommand-cve-2025-61984

  • https://github.com/openssh/openssh-portable/commit/35d5917652106aede47621bb3f64044604164043 (V_10_1_P1)

Связанные уязвимости

CVSS3: 3.6
ubuntu
4 месяца назад

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

CVSS3: 3.6
nvd
4 месяца назад

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

CVSS3: 3.6
msrc
4 месяца назад

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

suse-cvrf
3 месяца назад

Security update for openssh

CVSS3: 3.6
github
4 месяца назад

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)