Описание
ELSA-2025-6993: openssh security update (MODERATE)
[8.7p1-45.0.2]
- Upstream references found with /usr/bin/ssh [Orabug: 37814929]
[8.7p1-45.0.1]
- upstream: fix AuthorizedPrincipalsCommand when AuthorizedKeysCommand [Orabug: 37647064]
- Update upstream references [Orabug: 36564626]
[8.7p1-45]
- Fix missing error codes set and invalid error code checks in OpenSSH. It prevents memory exhaustion attack and a MITM attack when VerifyHostKeyDNS is on (CVE-2025-26465). Resolves: RHEL-78700
[8.7p1-44]
- Add extra help information on ssh early failure Resolves: RHEL-33809
- Provide details on crypto error instead of 'error in libcrypto' Resolves: RHEL-52293
- Allow duplicate Subsystem directive Resolves: RHEL-47112
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
openssh
8.7p1-45.0.2.el9
openssh-clients
8.7p1-45.0.2.el9
openssh-keycat
8.7p1-45.0.2.el9
openssh-server
8.7p1-45.0.2.el9
pam_ssh_agent_auth
0.10.4-5.45.0.2.el9
openssh-askpass
8.7p1-45.0.2.el9
Oracle Linux x86_64
openssh-askpass
8.7p1-45.0.2.el9
pam_ssh_agent_auth
0.10.4-5.45.0.2.el9
openssh
8.7p1-45.0.2.el9
openssh-clients
8.7p1-45.0.2.el9
openssh-keycat
8.7p1-45.0.2.el9
openssh-server
8.7p1-45.0.2.el9
Связанные CVE
Связанные уязвимости
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option ...