Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:4067-1

Опубликовано: 12 нояб. 2025
Источник: suse-cvrf

Описание

Security update for openssh

This update for openssh fixes the following issues:

  • CVE-2025-61984: Fixed code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198)
  • CVE-2025-61985: Fixed code execution via '\0' character in ssh:// URI when a ProxyCommand is used (bsc#1251199)

Список пакетов

Container suse/git:latest
openssh-clients-9.6p1-150600.6.34.1
openssh-common-9.6p1-150600.6.34.1
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest
openssh-9.6p1-150600.6.34.1
openssh-clients-9.6p1-150600.6.34.1
openssh-common-9.6p1-150600.6.34.1
openssh-server-9.6p1-150600.6.34.1
SUSE Linux Enterprise Module for Basesystem 15 SP6
openssh-9.6p1-150600.6.34.1
openssh-clients-9.6p1-150600.6.34.1
openssh-common-9.6p1-150600.6.34.1
openssh-fips-9.6p1-150600.6.34.1
openssh-helpers-9.6p1-150600.6.34.1
openssh-server-9.6p1-150600.6.34.1
openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1
SUSE Linux Enterprise Module for Basesystem 15 SP7
openssh-9.6p1-150600.6.34.1
openssh-clients-9.6p1-150600.6.34.1
openssh-common-9.6p1-150600.6.34.1
openssh-fips-9.6p1-150600.6.34.1
openssh-helpers-9.6p1-150600.6.34.1
openssh-server-9.6p1-150600.6.34.1
openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1
SUSE Linux Enterprise Module for Desktop Applications 15 SP6
openssh-askpass-gnome-9.6p1-150600.6.34.1
SUSE Linux Enterprise Module for Desktop Applications 15 SP7
openssh-askpass-gnome-9.6p1-150600.6.34.1
openSUSE Leap 15.6
openssh-9.6p1-150600.6.34.1
openssh-askpass-gnome-9.6p1-150600.6.34.1
openssh-cavs-9.6p1-150600.6.34.1
openssh-clients-9.6p1-150600.6.34.1
openssh-common-9.6p1-150600.6.34.1
openssh-fips-9.6p1-150600.6.34.1
openssh-helpers-9.6p1-150600.6.34.1
openssh-server-9.6p1-150600.6.34.1
openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1

Описание

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)


Затронутые продукты
Container suse/git:latest:openssh-clients-9.6p1-150600.6.34.1
Container suse/git:latest:openssh-common-9.6p1-150600.6.34.1
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:openssh-9.6p1-150600.6.34.1
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:openssh-clients-9.6p1-150600.6.34.1

Ссылки

Описание

ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.


Затронутые продукты
Container suse/git:latest:openssh-clients-9.6p1-150600.6.34.1
Container suse/git:latest:openssh-common-9.6p1-150600.6.34.1
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:openssh-9.6p1-150600.6.34.1
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:openssh-clients-9.6p1-150600.6.34.1

Ссылки