CVE-2025-61984

Publication date 6 October 2025

Last updated 12 March 2026


Ubuntu priority

Cvss 3 Severity Score

3.6 · Low

Score breakdown

Description

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

Read the notes from the security team

Why is this CVE low priority?

This issue is considered minor by OpenSSH developers

Learn more about Ubuntu priority

Status

Package Ubuntu Release Status
openssh 25.10 questing
Fixed 1:10.0p1-5ubuntu5.1
25.04 plucky Ignored end of life, was needs-triage
24.04 LTS noble
Fixed 1:9.6p1-3ubuntu13.15
22.04 LTS jammy
Fixed 1:8.9p1-3ubuntu0.14
20.04 LTS focal
Fixed 1:8.2p1-4ubuntu0.13+esm1
18.04 LTS bionic
Vulnerable
16.04 LTS xenial
Vulnerable
14.04 LTS trusty
Vulnerable
openssh-ssh1 25.10 questing Ignored
25.04 plucky Ignored
24.04 LTS noble Ignored
22.04 LTS jammy Ignored
20.04 LTS focal Ignored
18.04 LTS bionic Ignored

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro 30-day free trial

Notes


mdeslaur

openssh-ssh1 is only provided for compatibility with old devices that cannot be upgraded to modern protocols. We will not be providing any security support for the openssh-ssh1 package as it is insecure and should be used in trusted environments only. This issue is considered "minor" by the OpenSSH developers. Also, it is not recommended to construct ssh commandlines from untrusted usernames and URLs. As such, setting priority as "low", this can be bundled in the next round of OpenSSH security updates. When fixing this, also include username validity checking added to 9.6.

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
openssh

Severity score breakdown

Parameter Value
Base score 3.6 · Low
Attack vector Local
Attack complexity High
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality Low
Integrity impact Low
Availability impact None
Vector CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N

Access our resources on patching vulnerabilities