Follow @Openwall on Twitter for new release announcements and other news
[<prev] [day] [month] [year] [list]
Message-ID: <23c5cd0c-2a9b-4caa-a936-381210400cc2@oracle.com>
Date: Fri, 9 May 2025 09:15:37 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: Dropbear SSH 2025.88 fixes CVE-2025-47203

https://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2025q2/002385.html
announces the release of Dropbear SSH 2025.88 including this fix:

> - Security: Don't allow dbclient hostname arguments to be interpreted
>   by the shell.
> 
>   dbclient hostname arguments with a comma (for multihop) would be
>   passed to the shell which could result in running arbitrary shell
>   commands locally. That could be a security issue in situations
>   where dbclient is passed untrusted hostname arguments.
> 
>   Now the multihop command is executed directly, no shell is involved.
>   Thanks to Marcin Nowak for the report, tracked as CVE-2025-47203

-- 
         -Alan Coopersmith-                 alan.coopersmith@...cle.com
          Oracle Solaris Engineering - https://blogs.oracle.com/solaris

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.