Описание
Security update for openssh
This update for openssh fixes the following issues:
- CVE-2025-61984: code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198).
- CVE-2025-61985: code execution via '\0' character in ssh:// URI when a ProxyCommand is used (bsc#1251199).
Список пакетов
openSUSE Leap 16.0
openssh-10.0p2-160000.3.1
openssh-askpass-gnome-10.0p2-160000.3.1
openssh-cavs-10.0p2-160000.3.1
openssh-clients-10.0p2-160000.3.1
openssh-common-10.0p2-160000.3.1
openssh-helpers-10.0p2-160000.3.1
openssh-server-10.0p2-160000.3.1
openssh-server-config-rootlogin-10.0p2-160000.3.1
Ссылки
- SUSE Security Ratings
- SUSE Bug 1251198
- SUSE Bug 1251199
- SUSE CVE CVE-2025-61984 page
- SUSE CVE CVE-2025-61985 page
Описание
ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
Затронутые продукты
openSUSE Leap 16.0:openssh-10.0p2-160000.3.1
openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1
openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1
openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1
Ссылки
- CVE-2025-61984
- SUSE Bug 1251198
Описание
ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.
Затронутые продукты
openSUSE Leap 16.0:openssh-10.0p2-160000.3.1
openSUSE Leap 16.0:openssh-askpass-gnome-10.0p2-160000.3.1
openSUSE Leap 16.0:openssh-cavs-10.0p2-160000.3.1
openSUSE Leap 16.0:openssh-clients-10.0p2-160000.3.1
Ссылки
- CVE-2025-61985
- SUSE Bug 1251199