[CLSA-2026:1767627533] openssh: Fix of CVE-2025-61985
Type:
security
Severity:
Moderate
Release date:
2026-01-05 15:38:57 UTC
Description:
- CVE-2025-61985: potential code execution using the ‘\0’ character in an ssh:// URI, when a ProxyCommand is used
Updated packages:
  • openssh-8.0p1-24.el8.tuxcare.els4.x86_64.rpm
    sha:4d8ccc458808bc49f6bc4ed6ee4def07a777418d82cc1cfebc3515910cb23698
  • openssh-askpass-8.0p1-24.el8.tuxcare.els4.x86_64.rpm
    sha:58d582d66d21866b1133fed844f7b0db6aab0d99742747a95ac20fec42048a0b
  • openssh-cavs-8.0p1-24.el8.tuxcare.els4.x86_64.rpm
    sha:9eb304ff0d98143d84ad92b1817c66965f5f75708056579e1543b8c6a2054d77
  • openssh-clients-8.0p1-24.el8.tuxcare.els4.x86_64.rpm
    sha:574bdf79e4f55b701f5e95c385389f59e5334e642c4cd36e4dbfbec233ae38aa
  • openssh-keycat-8.0p1-24.el8.tuxcare.els4.x86_64.rpm
    sha:2d8a7b0108d72988ae3e32a28fa6cc4222d9fdd6056e40d18f69ba2dab956ec3
  • openssh-ldap-8.0p1-24.el8.tuxcare.els4.x86_64.rpm
    sha:6b43d9b8c4db4d32582e7772676fa52d32874941bffd867c4cf0327d801478fd
  • openssh-server-8.0p1-24.el8.tuxcare.els4.x86_64.rpm
    sha:2d80838e2c3c4e2c49e3f24ccc262e81959e5ed898652359741f978601b88583
  • pam_ssh_agent_auth-0.10.3-7.24.el8.tuxcare.els4.x86_64.rpm
    sha:40114a8ab2edd7c990edfd3b7f68c10dcaa36f1461ddf5e6286e02e7e745b43a
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.