]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/commit
openssh: fix CVE-2025-61984
authorDavid Nyström <david.nystrom@est.tech>
Wed, 15 Oct 2025 12:20:28 +0000 (14:20 +0200)
committerSteve Sakoman <steve@sakoman.com>
Wed, 15 Oct 2025 19:44:58 +0000 (12:44 -0700)
commit717d4c7609cdce2cc3a65b7ba69c316fa86a9333
tree89fa5ff9827688444b665e45389f54a47816e20d
parent52d925423b826383d12a97b834475ab5699fd492
openssh: fix CVE-2025-61984

ssh in OpenSSH before 10.1 allows control characters in usernames that
originate from certain possibly untrusted sources, potentially leading
to code execution when a ProxyCommand is used. The untrusted sources
are the command line and %-sequence expansion of a configuration file.

Note:
openssh does not support variable expansion until 10.0, so backport
adapts for this.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2025-61984

Upstream patch:
https://github.com/openssh/openssh-portable/commit/35d5917652106aede47621bb3f64044604164043

Signed-off-by: David Nyström <david.nystrom@est.tech>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-connectivity/openssh/openssh/CVE-2025-61984.patch [new file with mode: 0644]
meta/recipes-connectivity/openssh/openssh_9.6p1.bb