<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for openssh</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:20160-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-03-25T09:02:20Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-03-25T09:02:20Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-03-25T09:02:20Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for openssh</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for openssh fixes the following issues:

- CVE-2025-26465: Fixed MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040).
- CVE-2025-26466: Fixed DoS attack against OpenSSH's client and server (bsc#1237041).

Other bugfixes:

- Fix ssh client segfault with GSSAPIKeyExchange=yes in ssh_kex2 due to gssapi proposal not being correctly initialized (bsc#1236826). 
- Add #include &lt;stdlib.h&gt; in some files added by the ldap patch to fix build with gcc14 (bsc#1225904).
- Added missing struct initializer, added missing parameter (bsc#1222840).
- Remove OPENSSL_HAVE_EVPGCM-ifdef, which is no longer supported by upstream (bsc#1221928). 
- Use %config(noreplace) for sshd_config. In any case, it's recommended to drop a file in sshd_config.d instead of editing sshd_config (bsc#1221063).
- Add a patch to fix a regression introduced in 9.6 that makes X11 forwarding very slow (bsc#1229449).
- Drop keycat binary that is not supported, except of the code that is used by other SELinux patches (bsc#1229072).
- Fix RFC4256 implementation that keyboard-interactive authentication method can send instructions and sshd shows them to users (bsc#1229010).
- Add attempts to mitigate instances of secrets lingering in memory after a session exits (bsc#1186673, bsc#1213004, bsc#1213008).
- Remove empty line at the end of sshd-sle.pamd (bsc#1227456)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Micro-6.0-259</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520160-1/</URL>
      <Description>Link for SUSE-SU-2025:20160-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-June/021179.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:20160-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1186673</URL>
      <Description>SUSE Bug 1186673</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213004</URL>
      <Description>SUSE Bug 1213004</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213008</URL>
      <Description>SUSE Bug 1213008</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221063</URL>
      <Description>SUSE Bug 1221063</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221928</URL>
      <Description>SUSE Bug 1221928</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222840</URL>
      <Description>SUSE Bug 1222840</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1225904</URL>
      <Description>SUSE Bug 1225904</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227456</URL>
      <Description>SUSE Bug 1227456</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229010</URL>
      <Description>SUSE Bug 1229010</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229072</URL>
      <Description>SUSE Bug 1229072</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229449</URL>
      <Description>SUSE Bug 1229449</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236826</URL>
      <Description>SUSE Bug 1236826</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237040</URL>
      <Description>SUSE Bug 1237040</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237041</URL>
      <Description>SUSE Bug 1237041</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-26465/</URL>
      <Description>SUSE CVE CVE-2025-26465 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-26466/</URL>
      <Description>SUSE CVE CVE-2025-26466 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Micro 6.0">
      <Branch Type="Product Name" Name="SUSE Linux Micro 6.0">
        <FullProductName ProductID="SUSE Linux Micro 6.0" CPE="cpe:/o:suse:sl-micro:6.0">SUSE Linux Micro 6.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="openssh-9.6p1-3.1">
      <FullProductName ProductID="openssh-9.6p1-3.1">openssh-9.6p1-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh-clients-9.6p1-3.1">
      <FullProductName ProductID="openssh-clients-9.6p1-3.1">openssh-clients-9.6p1-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh-common-9.6p1-3.1">
      <FullProductName ProductID="openssh-common-9.6p1-3.1">openssh-common-9.6p1-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh-fips-9.6p1-3.1">
      <FullProductName ProductID="openssh-fips-9.6p1-3.1">openssh-fips-9.6p1-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh-server-9.6p1-3.1">
      <FullProductName ProductID="openssh-server-9.6p1-3.1">openssh-server-9.6p1-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh-server-config-rootlogin-9.6p1-3.1">
      <FullProductName ProductID="openssh-server-config-rootlogin-9.6p1-3.1">openssh-server-config-rootlogin-9.6p1-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="openssh-9.6p1-3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:openssh-9.6p1-3.1">openssh-9.6p1-3.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-clients-9.6p1-3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1">openssh-clients-9.6p1-3.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-common-9.6p1-3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1">openssh-common-9.6p1-3.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-fips-9.6p1-3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1">openssh-fips-9.6p1-3.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-server-9.6p1-3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1">openssh-server-9.6p1-3.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-server-config-rootlogin-9.6p1-3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1">openssh-server-config-rootlogin-9.6p1-3.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.</Note>
    </Notes>
    <CVE>CVE-2025-26465</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:openssh-9.6p1-3.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520160-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-26465.html</URL>
        <Description>CVE-2025-26465</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1237040</URL>
        <Description>SUSE Bug 1237040</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1237041</URL>
        <Description>SUSE Bug 1237041</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.</Note>
    </Notes>
    <CVE>CVE-2025-26466</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:openssh-9.6p1-3.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:openssh-clients-9.6p1-3.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:openssh-common-9.6p1-3.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:openssh-fips-9.6p1-3.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:openssh-server-9.6p1-3.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:openssh-server-config-rootlogin-9.6p1-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520160-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-26466.html</URL>
        <Description>CVE-2025-26466</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1237041</URL>
        <Description>SUSE Bug 1237041</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
