Описание
Security update for openssh
This update for openssh fixes the following issues:
- CVE-2025-61984: Fixed code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198)
- CVE-2025-61985: Fixed code execution via '\0' character in ssh:// URI when a ProxyCommand is used (bsc#1251199)
Список пакетов
Container suse/git:latest
openssh-clients-9.6p1-150600.6.34.1
openssh-common-9.6p1-150600.6.34.1
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest
openssh-9.6p1-150600.6.34.1
openssh-clients-9.6p1-150600.6.34.1
openssh-common-9.6p1-150600.6.34.1
openssh-server-9.6p1-150600.6.34.1
SUSE Linux Enterprise Module for Basesystem 15 SP6
openssh-9.6p1-150600.6.34.1
openssh-clients-9.6p1-150600.6.34.1
openssh-common-9.6p1-150600.6.34.1
openssh-fips-9.6p1-150600.6.34.1
openssh-helpers-9.6p1-150600.6.34.1
openssh-server-9.6p1-150600.6.34.1
openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1
SUSE Linux Enterprise Module for Basesystem 15 SP7
openssh-9.6p1-150600.6.34.1
openssh-clients-9.6p1-150600.6.34.1
openssh-common-9.6p1-150600.6.34.1
openssh-fips-9.6p1-150600.6.34.1
openssh-helpers-9.6p1-150600.6.34.1
openssh-server-9.6p1-150600.6.34.1
openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1
SUSE Linux Enterprise Module for Desktop Applications 15 SP6
openssh-askpass-gnome-9.6p1-150600.6.34.1
SUSE Linux Enterprise Module for Desktop Applications 15 SP7
openssh-askpass-gnome-9.6p1-150600.6.34.1
openSUSE Leap 15.6
openssh-9.6p1-150600.6.34.1
openssh-askpass-gnome-9.6p1-150600.6.34.1
openssh-cavs-9.6p1-150600.6.34.1
openssh-clients-9.6p1-150600.6.34.1
openssh-common-9.6p1-150600.6.34.1
openssh-fips-9.6p1-150600.6.34.1
openssh-helpers-9.6p1-150600.6.34.1
openssh-server-9.6p1-150600.6.34.1
openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1
Ссылки
- Link for SUSE-SU-2025:4067-1
- E-Mail link for SUSE-SU-2025:4067-1
- SUSE Security Ratings
- SUSE Bug 1251198
- SUSE Bug 1251199
- SUSE CVE CVE-2025-61984 page
- SUSE CVE CVE-2025-61985 page
Описание
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
Затронутые продукты
Container suse/git:latest:openssh-clients-9.6p1-150600.6.34.1
Container suse/git:latest:openssh-common-9.6p1-150600.6.34.1
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:openssh-9.6p1-150600.6.34.1
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:openssh-clients-9.6p1-150600.6.34.1
Ссылки
- CVE-2025-61984
- SUSE Bug 1251198
Описание
ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.
Затронутые продукты
Container suse/git:latest:openssh-clients-9.6p1-150600.6.34.1
Container suse/git:latest:openssh-common-9.6p1-150600.6.34.1
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:openssh-9.6p1-150600.6.34.1
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:openssh-clients-9.6p1-150600.6.34.1
Ссылки
- CVE-2025-61985
- SUSE Bug 1251199