![]() |
|
Message-ID: <23c5cd0c-2a9b-4caa-a936-381210400cc2@oracle.com> Date: Fri, 9 May 2025 09:15:37 -0700 From: Alan Coopersmith <alan.coopersmith@...cle.com> To: oss-security@...ts.openwall.com Subject: Dropbear SSH 2025.88 fixes CVE-2025-47203 https://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2025q2/002385.html announces the release of Dropbear SSH 2025.88 including this fix: > - Security: Don't allow dbclient hostname arguments to be interpreted > by the shell. > > dbclient hostname arguments with a comma (for multihop) would be > passed to the shell which could result in running arbitrary shell > commands locally. That could be a security issue in situations > where dbclient is passed untrusted hostname arguments. > > Now the multihop command is executed directly, no shell is involved. > Thanks to Marcin Nowak for the report, tracked as CVE-2025-47203 -- -Alan Coopersmith- alan.coopersmith@...cle.com Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.