SB2025111741 - SUSE update for openssh
Published: November 17, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) OS Command Injection (CVE-ID: CVE-2025-61984)
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper validation of control characters in usernames obtained from an untrusted source (such as command line and %-sequence expansion of a configuration file). A remote attacker can trick the victim into initiating an ssh connection using a specially crafted configuration file and execute arbitrary shell commands on the system.
This vulnerability affects ssh client command and does not affect the sshd daemon.
2) Improper Neutralization of Null Byte or NUL Character (CVE-ID: CVE-2025-61985)
The vulnerability allows a remote attacker to execute arbitrary OS commands on the system.
The vulnerability exists due to incorrect handling of the nullbyte character in an ssh:// URI if a ProxyCommand that uses the %r expansion was configured. A remote attacker can trick the victim into using a specially crafted ssh command to connect to a remote server and execute arbitrary OS commands on the system.
This vulnerability affects ssh client command and does not affect the sshd daemon.
Remediation
Install update from vendor's website.