Release date:
2026-01-05 15:43:51 UTC
Description:
- CVE-2025-61985: potential code execution using the ‘\0’ character in
an ssh:// URI, when a ProxyCommand is used
Updated packages:
-
openssh-8.0p1-6.el8_4.2.tuxcare.els8.x86_64.rpm
sha:d9ab97d6536229d4640b503ab7470ec257dffaeadcf25a3fe8d2da01c072915b
-
openssh-askpass-8.0p1-6.el8_4.2.tuxcare.els8.x86_64.rpm
sha:90d8d850f4c77a103d650023ed1c188dbc752b287a8ae1051512078e163421c9
-
openssh-cavs-8.0p1-6.el8_4.2.tuxcare.els8.x86_64.rpm
sha:10e8aeb3fd8353d6cce3ffc5c89ba622d922ecc099aad77aa3d06b7a76ecfcfc
-
openssh-clients-8.0p1-6.el8_4.2.tuxcare.els8.x86_64.rpm
sha:401ffbb60952402fccfa768f3e0fb0b763a1980c60b477367bed166ae4fb8dca
-
openssh-keycat-8.0p1-6.el8_4.2.tuxcare.els8.x86_64.rpm
sha:c992f1617b5f5a0dee8c0121e0c56c8537e9a78ffe04de4c98608750abbf88c8
-
openssh-ldap-8.0p1-6.el8_4.2.tuxcare.els8.x86_64.rpm
sha:b4585abcbada70e03d6105e9f9ff3859720988709507a7b4837e871d83bae877
-
openssh-server-8.0p1-6.el8_4.2.tuxcare.els8.x86_64.rpm
sha:6b2536f0f92b6e15f2df3f05d8d79f30f6f6eb5e9d54834f7d91ba163cb877a8
-
pam_ssh_agent_auth-0.10.3-7.6.el8_4.1.tuxcare.els8.x86_64.rpm
sha:6e79af6a0922a82ddcb6bf3c4c6506bee995c85a4b49cd8dcc5ce8da71fd39fb
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.