Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:0659-1

Опубликовано: 23 фев. 2025
Источник: suse-cvrf

Описание

Security update for openssh

This update for openssh fixes the following issues:

  • CVE-2025-26465: Fixed a MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040).

  • Add a s390 specific ioctl for ECC hardware support (bsc#1225637):

  • for migration to openssh 8.4: write active/enabled switch over files only if not yet present (bsc#1220110)

Список пакетов

Image SLES12-SP5-EC2-BYOS
openssh-7.2p2-81.26.1
Image SLES12-SP5-EC2-On-Demand
openssh-7.2p2-81.26.1
Image SLES12-SP5-EC2-SAP-BYOS
openssh-7.2p2-81.26.1
Image SLES12-SP5-EC2-SAP-On-Demand
openssh-7.2p2-81.26.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
openssh-7.2p2-81.26.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
openssh-7.2p2-81.26.1
SUSE Linux Enterprise Server 12 SP5-LTSS
openssh-7.2p2-81.26.1
openssh-askpass-gnome-7.2p2-81.26.1
openssh-fips-7.2p2-81.26.1
openssh-helpers-7.2p2-81.26.1
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5
openssh-7.2p2-81.26.1
openssh-askpass-gnome-7.2p2-81.26.1
openssh-fips-7.2p2-81.26.1
openssh-helpers-7.2p2-81.26.1

Описание

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.


Затронутые продукты
Image SLES12-SP5-EC2-BYOS:openssh-7.2p2-81.26.1
Image SLES12-SP5-EC2-On-Demand:openssh-7.2p2-81.26.1
Image SLES12-SP5-EC2-SAP-BYOS:openssh-7.2p2-81.26.1
Image SLES12-SP5-EC2-SAP-On-Demand:openssh-7.2p2-81.26.1

Ссылки