Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:0585-1

Опубликовано: 18 фев. 2025
Источник: suse-cvrf

Описание

Security update for openssh

This update for openssh fixes the following issues:

  • CVE-2025-26465: Fixed MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040).
  • CVE-2025-26466: Fixed DoS attack against OpenSSH's client and server (bsc#1237041).

Список пакетов

Container suse/git:latest
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
Image SLES15-SP6
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
Image SLES15-SP6-BYOS
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
Image SLES15-SP6-BYOS-GCE
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
Image SLES15-SP6-CHOST-BYOS
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
Image SLES15-SP6-CHOST-BYOS-Azure
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
Image SLES15-SP6-CHOST-BYOS-EC2
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
Image SLES15-SP6-CHOST-BYOS-GCE
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
Image SLES15-SP6-CHOST-BYOS-GDC
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
Image SLES15-SP6-CHOST-BYOS-SAP-CCloud
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
Image SLES15-SP6-GCE
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
Image SLES15-SP6-Hardened-BYOS
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
Image SLES15-SP6-Hardened-BYOS-GCE
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
Image SLES15-SP6-SAP-BYOS
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
Image SLES15-SP6-SAP-BYOS-GCE
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
SUSE Linux Enterprise Module for Basesystem 15 SP6
openssh-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-fips-9.6p1-150600.6.15.2
openssh-helpers-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2
SUSE Linux Enterprise Module for Desktop Applications 15 SP6
openssh-askpass-gnome-9.6p1-150600.6.15.1
openSUSE Leap 15.6
openssh-9.6p1-150600.6.15.2
openssh-askpass-gnome-9.6p1-150600.6.15.1
openssh-cavs-9.6p1-150600.6.15.2
openssh-clients-9.6p1-150600.6.15.2
openssh-common-9.6p1-150600.6.15.2
openssh-fips-9.6p1-150600.6.15.2
openssh-helpers-9.6p1-150600.6.15.2
openssh-server-9.6p1-150600.6.15.2
openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2

Описание

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.


Затронутые продукты
Container suse/git:latest:openssh-clients-9.6p1-150600.6.15.2
Container suse/git:latest:openssh-common-9.6p1-150600.6.15.2
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:openssh-9.6p1-150600.6.15.2
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:openssh-clients-9.6p1-150600.6.15.2

Ссылки

Описание

A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.


Затронутые продукты
Container suse/git:latest:openssh-clients-9.6p1-150600.6.15.2
Container suse/git:latest:openssh-common-9.6p1-150600.6.15.2
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:openssh-9.6p1-150600.6.15.2
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest:openssh-clients-9.6p1-150600.6.15.2

Ссылки