<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for openssh8.4</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:0744-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-02-28T14:39:36Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-02-28T14:39:36Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-02-28T14:39:36Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for openssh8.4</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for openssh8.4 fixes the following issues:

- CVE-2025-26465: Fixed a MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040).

Other bugfixes:

- Fix usage of local accelerator cards via openssl-ibmca (bsc#1216474, bsc#1218871).
- Add patches from upstream to change the default value of UpdateHostKeys to Yes (unless VerifyHostKeyDNS is enabled) (bsc#1222831).
- Fix hostbased ssh login failing occasionally with 'signature unverified: incorrect signature' by fixing a typo in patch (bsc#1221123).
- For now we don't ship the ssh-keycat command, but we need the patch for the other SELinux infrastructure (bsc#1214788).
- Attempts to mitigate instances of secrets lingering in memory after a session exits (bsc#1213004, bsc#1213008, bsc#1186673).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-744,SUSE-SLE-SERVER-12-SP5-LTSS-2025-744,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-744</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250744-1/</URL>
      <Description>Link for SUSE-SU-2025:0744-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-February/020457.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:0744-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1186673</URL>
      <Description>SUSE Bug 1186673</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213004</URL>
      <Description>SUSE Bug 1213004</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213008</URL>
      <Description>SUSE Bug 1213008</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1214788</URL>
      <Description>SUSE Bug 1214788</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1216474</URL>
      <Description>SUSE Bug 1216474</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1218871</URL>
      <Description>SUSE Bug 1218871</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221123</URL>
      <Description>SUSE Bug 1221123</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222831</URL>
      <Description>SUSE Bug 1222831</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237040</URL>
      <Description>SUSE Bug 1237040</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-26465/</URL>
      <Description>SUSE CVE CVE-2025-26465 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP5-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS" CPE="cpe:/o:suse:sles-ltss-extended-security:12:sp5">SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" CPE="cpe:/o:suse:sles-ltss-extended-security:12:sp5">SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="openssh8.4-8.4p1-8.16.1">
      <FullProductName ProductID="openssh8.4-8.4p1-8.16.1">openssh8.4-8.4p1-8.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh8.4-cavs-8.4p1-8.16.1">
      <FullProductName ProductID="openssh8.4-cavs-8.4p1-8.16.1">openssh8.4-cavs-8.4p1-8.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh8.4-clients-8.4p1-8.16.1">
      <FullProductName ProductID="openssh8.4-clients-8.4p1-8.16.1">openssh8.4-clients-8.4p1-8.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh8.4-common-8.4p1-8.16.1">
      <FullProductName ProductID="openssh8.4-common-8.4p1-8.16.1">openssh8.4-common-8.4p1-8.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh8.4-fips-8.4p1-8.16.1">
      <FullProductName ProductID="openssh8.4-fips-8.4p1-8.16.1">openssh8.4-fips-8.4p1-8.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh8.4-helpers-8.4p1-8.16.1">
      <FullProductName ProductID="openssh8.4-helpers-8.4p1-8.16.1">openssh8.4-helpers-8.4p1-8.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh8.4-server-8.4p1-8.16.1">
      <FullProductName ProductID="openssh8.4-server-8.4p1-8.16.1">openssh8.4-server-8.4p1-8.16.1</FullProductName>
    </Branch>
    <Relationship ProductReference="openssh8.4-8.4p1-8.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1">openssh8.4-8.4p1-8.16.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh8.4-clients-8.4p1-8.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1">openssh8.4-clients-8.4p1-8.16.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh8.4-common-8.4p1-8.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1">openssh8.4-common-8.4p1-8.16.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh8.4-fips-8.4p1-8.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1">openssh8.4-fips-8.4p1-8.16.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh8.4-helpers-8.4p1-8.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1">openssh8.4-helpers-8.4p1-8.16.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh8.4-server-8.4p1-8.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1">openssh8.4-server-8.4p1-8.16.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh8.4-8.4p1-8.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-8.4p1-8.16.1">openssh8.4-8.4p1-8.16.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh8.4-clients-8.4p1-8.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-clients-8.4p1-8.16.1">openssh8.4-clients-8.4p1-8.16.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh8.4-common-8.4p1-8.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-common-8.4p1-8.16.1">openssh8.4-common-8.4p1-8.16.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh8.4-fips-8.4p1-8.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-fips-8.4p1-8.16.1">openssh8.4-fips-8.4p1-8.16.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh8.4-helpers-8.4p1-8.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-helpers-8.4p1-8.16.1">openssh8.4-helpers-8.4p1-8.16.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh8.4-server-8.4p1-8.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-server-8.4p1-8.16.1">openssh8.4-server-8.4p1-8.16.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.</Note>
    </Notes>
    <CVE>CVE-2025-26465</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-8.4p1-8.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-clients-8.4p1-8.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-common-8.4p1-8.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-fips-8.4p1-8.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-helpers-8.4p1-8.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:openssh8.4-server-8.4p1-8.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-8.4p1-8.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-clients-8.4p1-8.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-common-8.4p1-8.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-fips-8.4p1-8.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-helpers-8.4p1-8.16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:openssh8.4-server-8.4p1-8.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250744-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-26465.html</URL>
        <Description>CVE-2025-26465</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1237040</URL>
        <Description>SUSE Bug 1237040</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1237041</URL>
        <Description>SUSE Bug 1237041</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
