SB2025111741 - SUSE update for openssh 



SB2025111741 - SUSE update for openssh

Published: November 17, 2025

Security Bulletin ID SB2025111741
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) OS Command Injection (CVE-ID: CVE-2025-61984)

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper validation of control characters in usernames obtained from an untrusted source (such as command line and %-sequence expansion of a configuration file). A remote attacker can trick the victim into initiating an ssh connection using a specially crafted configuration file and execute arbitrary shell commands on the system. 

This vulnerability affects ssh client command and does not affect the sshd daemon. 


2) Improper Neutralization of Null Byte or NUL Character (CVE-ID: CVE-2025-61985)

The vulnerability allows a remote attacker to execute arbitrary OS commands on the system.

The vulnerability exists due to incorrect handling of the nullbyte character in an ssh:// URI if a ProxyCommand that uses the %r expansion was configured. A remote attacker can trick the victim into using a specially crafted ssh command to connect to a remote server and execute arbitrary OS commands on the system.

This vulnerability affects ssh client command and does not affect the sshd daemon. 


Remediation

Install update from vendor's website.