Описание
Security update for openssh
This update for openssh fixes the following issues:
-
CVE-2025-26465: Fixed a MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040).
-
Add a s390 specific ioctl for ECC hardware support (bsc#1225637):
-
for migration to openssh 8.4: write active/enabled switch over files only if not yet present (bsc#1220110)
Список пакетов
Image SLES12-SP5-EC2-BYOS
Image SLES12-SP5-EC2-On-Demand
Image SLES12-SP5-EC2-SAP-BYOS
Image SLES12-SP5-EC2-SAP-On-Demand
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
SUSE Linux Enterprise Server 12 SP5-LTSS
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5
Ссылки
- Link for SUSE-SU-2025:0659-1
- E-Mail link for SUSE-SU-2025:0659-1
- SUSE Security Ratings
- SUSE Bug 1220110
- SUSE Bug 1225637
- SUSE Bug 1237040
- SUSE CVE CVE-2025-26465 page
Описание
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
Затронутые продукты
Ссылки
- CVE-2025-26465
- SUSE Bug 1237040
- SUSE Bug 1237041