]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/commit
openssh: fix CVE-2025-61984
authorHitendra Prajapati <hprajapati@mvista.com>
Mon, 8 Dec 2025 07:05:05 +0000 (12:35 +0530)
committerSteve Sakoman <steve@sakoman.com>
Mon, 8 Dec 2025 14:43:27 +0000 (06:43 -0800)
commit7ca0c7a4d17c707658669e255689ecd4183c7e9b
tree83cc1d58f770d0f02eb2ecc1b38c13aafc9eb7d5
parentc33ebd0882288a962c089b423cc2468a7c84c2e7
openssh: fix CVE-2025-61984

ssh in OpenSSH before 10.1 allows control characters in usernames that
originate from certain possibly untrusted sources, potentially leading
to code execution when a ProxyCommand is used. The untrusted sources
are the command line and %-sequence expansion of a configuration file.

Note:
openssh does not support variable expansion until 10.0, so backport
adapts for this.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2025-61984

Upstream-Status: Backport from https://github.com/openssh/openssh-portable/commit/35d5917652106aede47621bb3f64044604164043

Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-connectivity/openssh/openssh/CVE-2025-61984.patch [new file with mode: 0644]
meta/recipes-connectivity/openssh/openssh_8.9p1.bb