suse-su-2025:20160-1
Vulnerability from csaf_suse
Published
2025-03-25 09:02
Modified
2025-03-25 09:02
Summary
Security update for openssh

Notes

Title of the patch
Security update for openssh
Description of the patch
This update for openssh fixes the following issues: - CVE-2025-26465: Fixed MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040). - CVE-2025-26466: Fixed DoS attack against OpenSSH's client and server (bsc#1237041). Other bugfixes: - Fix ssh client segfault with GSSAPIKeyExchange=yes in ssh_kex2 due to gssapi proposal not being correctly initialized (bsc#1236826). - Add #include <stdlib.h> in some files added by the ldap patch to fix build with gcc14 (bsc#1225904). - Added missing struct initializer, added missing parameter (bsc#1222840). - Remove OPENSSL_HAVE_EVPGCM-ifdef, which is no longer supported by upstream (bsc#1221928). - Use %config(noreplace) for sshd_config. In any case, it's recommended to drop a file in sshd_config.d instead of editing sshd_config (bsc#1221063). - Add a patch to fix a regression introduced in 9.6 that makes X11 forwarding very slow (bsc#1229449). - Drop keycat binary that is not supported, except of the code that is used by other SELinux patches (bsc#1229072). - Fix RFC4256 implementation that keyboard-interactive authentication method can send instructions and sshd shows them to users (bsc#1229010). - Add attempts to mitigate instances of secrets lingering in memory after a session exits (bsc#1186673, bsc#1213004, bsc#1213008). - Remove empty line at the end of sshd-sle.pamd (bsc#1227456)
Patchnames
SUSE-SLE-Micro-6.0-259
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for openssh",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for openssh fixes the following issues:\n\n- CVE-2025-26465: Fixed MitM attack against OpenSSH\u0027s VerifyHostKeyDNS-enabled client (bsc#1237040).\n- CVE-2025-26466: Fixed DoS attack against OpenSSH\u0027s client and server (bsc#1237041).\n\nOther bugfixes:\n\n- Fix ssh client segfault with GSSAPIKeyExchange=yes in ssh_kex2 due to gssapi proposal not being correctly initialized (bsc#1236826). \n- Add #include \u003cstdlib.h\u003e in some files added by the ldap patch to fix build with gcc14 (bsc#1225904).\n- Added missing struct initializer, added missing parameter (bsc#1222840).\n- Remove OPENSSL_HAVE_EVPGCM-ifdef, which is no longer supported by upstream (bsc#1221928). \n- Use %config(noreplace) for sshd_config. In any case, it\u0027s recommended to drop a file in sshd_config.d instead of editing sshd_config (bsc#1221063).\n- Add a patch to fix a regression introduced in 9.6 that makes X11 forwarding very slow (bsc#1229449).\n- Drop keycat binary that is not supported, except of the code that is used by other SELinux patches (bsc#1229072).\n- Fix RFC4256 implementation that keyboard-interactive authentication method can send instructions and sshd shows them to users (bsc#1229010).\n- Add attempts to mitigate instances of secrets lingering in memory after a session exits (bsc#1186673, bsc#1213004, bsc#1213008).\n- Remove empty line at the end of sshd-sle.pamd (bsc#1227456)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-SLE-Micro-6.0-259",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20160-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2025:20160-1",
        "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520160-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2025:20160-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021179.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186673",
        "url": "https://bugzilla.suse.com/1186673"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1213004",
        "url": "https://bugzilla.suse.com/1213004"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1213008",
        "url": "https://bugzilla.suse.com/1213008"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221063",
        "url": "https://bugzilla.suse.com/1221063"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221928",
        "url": "https://bugzilla.suse.com/1221928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222840",
        "url": "https://bugzilla.suse.com/1222840"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225904",
        "url": "https://bugzilla.suse.com/1225904"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1227456",
        "url": "https://bugzilla.suse.com/1227456"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1229010",
        "url": "https://bugzilla.suse.com/1229010"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1229072",
        "url": "https://bugzilla.suse.com/1229072"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1229449",
        "url": "https://bugzilla.suse.com/1229449"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1236826",
        "url": "https://bugzilla.suse.com/1236826"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237040",
        "url": "https://bugzilla.suse.com/1237040"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237041",
        "url": "https://bugzilla.suse.com/1237041"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-26465 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-26465/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-26466 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-26466/"
      }
    ],
    "title": "Security update for openssh",
    "tracking": {
      "current_release_date": "2025-03-25T09:02:20Z",
      "generator": {
        "date": "2025-03-25T09:02:20Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2025:20160-1",
      "initial_release_date": "2025-03-25T09:02:20Z",
      "revision_history": [
        {
          "date": "2025-03-25T09:02:20Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssh-9.6p1-3.1.aarch64",
                "product": {
                  "name": "openssh-9.6p1-3.1.aarch64",
                  "product_id": "openssh-9.6p1-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "openssh-clients-9.6p1-3.1.aarch64",
                "product": {
                  "name": "openssh-clients-9.6p1-3.1.aarch64",
                  "product_id": "openssh-clients-9.6p1-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "openssh-common-9.6p1-3.1.aarch64",
                "product": {
                  "name": "openssh-common-9.6p1-3.1.aarch64",
                  "product_id": "openssh-common-9.6p1-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "openssh-fips-9.6p1-3.1.aarch64",
                "product": {
                  "name": "openssh-fips-9.6p1-3.1.aarch64",
                  "product_id": "openssh-fips-9.6p1-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "openssh-server-9.6p1-3.1.aarch64",
                "product": {
                  "name": "openssh-server-9.6p1-3.1.aarch64",
                  "product_id": "openssh-server-9.6p1-3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "openssh-server-config-rootlogin-9.6p1-3.1.aarch64",
                "product": {
                  "name": "openssh-server-config-rootlogin-9.6p1-3.1.aarch64",
                  "product_id": "openssh-server-config-rootlogin-9.6p1-3.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssh-9.6p1-3.1.s390x",
                "product": {
                  "name": "openssh-9.6p1-3.1.s390x",
                  "product_id": "openssh-9.6p1-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "openssh-clients-9.6p1-3.1.s390x",
                "product": {
                  "name": "openssh-clients-9.6p1-3.1.s390x",
                  "product_id": "openssh-clients-9.6p1-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "openssh-common-9.6p1-3.1.s390x",
                "product": {
                  "name": "openssh-common-9.6p1-3.1.s390x",
                  "product_id": "openssh-common-9.6p1-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "openssh-fips-9.6p1-3.1.s390x",
                "product": {
                  "name": "openssh-fips-9.6p1-3.1.s390x",
                  "product_id": "openssh-fips-9.6p1-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "openssh-server-9.6p1-3.1.s390x",
                "product": {
                  "name": "openssh-server-9.6p1-3.1.s390x",
                  "product_id": "openssh-server-9.6p1-3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "openssh-server-config-rootlogin-9.6p1-3.1.s390x",
                "product": {
                  "name": "openssh-server-config-rootlogin-9.6p1-3.1.s390x",
                  "product_id": "openssh-server-config-rootlogin-9.6p1-3.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssh-9.6p1-3.1.x86_64",
                "product": {
                  "name": "openssh-9.6p1-3.1.x86_64",
                  "product_id": "openssh-9.6p1-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "openssh-clients-9.6p1-3.1.x86_64",
                "product": {
                  "name": "openssh-clients-9.6p1-3.1.x86_64",
                  "product_id": "openssh-clients-9.6p1-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "openssh-common-9.6p1-3.1.x86_64",
                "product": {
                  "name": "openssh-common-9.6p1-3.1.x86_64",
                  "product_id": "openssh-common-9.6p1-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "openssh-fips-9.6p1-3.1.x86_64",
                "product": {
                  "name": "openssh-fips-9.6p1-3.1.x86_64",
                  "product_id": "openssh-fips-9.6p1-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "openssh-server-9.6p1-3.1.x86_64",
                "product": {
                  "name": "openssh-server-9.6p1-3.1.x86_64",
                  "product_id": "openssh-server-9.6p1-3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "openssh-server-config-rootlogin-9.6p1-3.1.x86_64",
                "product": {
                  "name": "openssh-server-config-rootlogin-9.6p1-3.1.x86_64",
                  "product_id": "openssh-server-config-rootlogin-9.6p1-3.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Micro 6.0",
                "product": {
                  "name": "SUSE Linux Micro 6.0",
                  "product_id": "SUSE Linux Micro 6.0",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sl-micro:6.0"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-9.6p1-3.1.aarch64 as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.aarch64"
        },
        "product_reference": "openssh-9.6p1-3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-9.6p1-3.1.s390x as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.s390x"
        },
        "product_reference": "openssh-9.6p1-3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-9.6p1-3.1.x86_64 as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.x86_64"
        },
        "product_reference": "openssh-9.6p1-3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-clients-9.6p1-3.1.aarch64 as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.aarch64"
        },
        "product_reference": "openssh-clients-9.6p1-3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-clients-9.6p1-3.1.s390x as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.s390x"
        },
        "product_reference": "openssh-clients-9.6p1-3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-clients-9.6p1-3.1.x86_64 as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.x86_64"
        },
        "product_reference": "openssh-clients-9.6p1-3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-common-9.6p1-3.1.aarch64 as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.aarch64"
        },
        "product_reference": "openssh-common-9.6p1-3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-common-9.6p1-3.1.s390x as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.s390x"
        },
        "product_reference": "openssh-common-9.6p1-3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-common-9.6p1-3.1.x86_64 as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.x86_64"
        },
        "product_reference": "openssh-common-9.6p1-3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-fips-9.6p1-3.1.aarch64 as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.aarch64"
        },
        "product_reference": "openssh-fips-9.6p1-3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-fips-9.6p1-3.1.s390x as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.s390x"
        },
        "product_reference": "openssh-fips-9.6p1-3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-fips-9.6p1-3.1.x86_64 as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.x86_64"
        },
        "product_reference": "openssh-fips-9.6p1-3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-server-9.6p1-3.1.aarch64 as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.aarch64"
        },
        "product_reference": "openssh-server-9.6p1-3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-server-9.6p1-3.1.s390x as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.s390x"
        },
        "product_reference": "openssh-server-9.6p1-3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-server-9.6p1-3.1.x86_64 as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.x86_64"
        },
        "product_reference": "openssh-server-9.6p1-3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-server-config-rootlogin-9.6p1-3.1.aarch64 as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.aarch64"
        },
        "product_reference": "openssh-server-config-rootlogin-9.6p1-3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-server-config-rootlogin-9.6p1-3.1.s390x as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.s390x"
        },
        "product_reference": "openssh-server-config-rootlogin-9.6p1-3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssh-server-config-rootlogin-9.6p1-3.1.x86_64 as component of SUSE Linux Micro 6.0",
          "product_id": "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.x86_64"
        },
        "product_reference": "openssh-server-config-rootlogin-9.6p1-3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Micro 6.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-26465",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-26465"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client\u0027s memory resource first, turning the attack complexity high.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.aarch64",
          "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.s390x",
          "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.x86_64",
          "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.aarch64",
          "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.s390x",
          "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.x86_64",
          "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.aarch64",
          "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.s390x",
          "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.x86_64",
          "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.aarch64",
          "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.s390x",
          "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.x86_64",
          "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.aarch64",
          "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.s390x",
          "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.x86_64",
          "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.aarch64",
          "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.s390x",
          "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-26465",
          "url": "https://www.suse.com/security/cve/CVE-2025-26465"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237040 for CVE-2025-26465",
          "url": "https://bugzilla.suse.com/1237040"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237041 for CVE-2025-26465",
          "url": "https://bugzilla.suse.com/1237041"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-25T09:02:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-26465"
    },
    {
      "cve": "CVE-2025-26466",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-26466"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.aarch64",
          "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.s390x",
          "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.x86_64",
          "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.aarch64",
          "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.s390x",
          "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.x86_64",
          "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.aarch64",
          "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.s390x",
          "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.x86_64",
          "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.aarch64",
          "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.s390x",
          "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.x86_64",
          "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.aarch64",
          "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.s390x",
          "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.x86_64",
          "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.aarch64",
          "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.s390x",
          "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-26466",
          "url": "https://www.suse.com/security/cve/CVE-2025-26466"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237041 for CVE-2025-26466",
          "url": "https://bugzilla.suse.com/1237041"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1.x86_64",
            "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.aarch64",
            "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.s390x",
            "SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-03-25T09:02:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-26466"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…