<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for openssh</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:20226-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-02-26T13:46:04Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-02-26T13:46:04Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-02-26T13:46:04Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for openssh</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for openssh fixes the following issues:

Security issues fixed:

- CVE-2025-26465: Fixed a MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040)
- CVE-2025-26466: Fixed a DoS attack against OpenSSH's client and server (bsc#1237041)

Other issues fixed:

- Fix ssh client segfault with GSSAPIKeyExchange=yes in ssh_kex2
  due to gssapi proposal not being correctly initialized
  (bsc#1236826).
- Add a patch to fix a regression introduced in 9.6 that makes X11
  forwarding very slow. (bsc#1229449)
- Fixed RFC4256 implementation so that keyboard-interactive authentication method can send
  instructions and sshd shows them to users even before a prompt
  is requested. This fixes MFA push notifications (bsc#1229010).
- Fix a dbus connection leaked in the logind patch that was
  missing a sd_bus_unref call
- Add a patch that fixes a small memory leak when parsing the
  subsystem configuration option:
- Remove empty line at the end of sshd-sle.pamd (bsc#1227456)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Micro-6.1-21</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520226-1/</URL>
      <Description>Link for SUSE-SU-2025:20226-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-June/021099.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:20226-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227456</URL>
      <Description>SUSE Bug 1227456</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229010</URL>
      <Description>SUSE Bug 1229010</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229072</URL>
      <Description>SUSE Bug 1229072</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229449</URL>
      <Description>SUSE Bug 1229449</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1236826</URL>
      <Description>SUSE Bug 1236826</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237040</URL>
      <Description>SUSE Bug 1237040</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1237041</URL>
      <Description>SUSE Bug 1237041</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-26465/</URL>
      <Description>SUSE CVE CVE-2025-26465 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-26466/</URL>
      <Description>SUSE CVE CVE-2025-26466 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Micro 6.1">
      <Branch Type="Product Name" Name="SUSE Linux Micro 6.1">
        <FullProductName ProductID="SUSE Linux Micro 6.1" CPE="cpe:/o:suse:sl-micro:6.1">SUSE Linux Micro 6.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="openssh-9.6p1-slfo.1.1_2.1">
      <FullProductName ProductID="openssh-9.6p1-slfo.1.1_2.1">openssh-9.6p1-slfo.1.1_2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh-clients-9.6p1-slfo.1.1_2.1">
      <FullProductName ProductID="openssh-clients-9.6p1-slfo.1.1_2.1">openssh-clients-9.6p1-slfo.1.1_2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh-common-9.6p1-slfo.1.1_2.1">
      <FullProductName ProductID="openssh-common-9.6p1-slfo.1.1_2.1">openssh-common-9.6p1-slfo.1.1_2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh-fips-9.6p1-slfo.1.1_2.1">
      <FullProductName ProductID="openssh-fips-9.6p1-slfo.1.1_2.1">openssh-fips-9.6p1-slfo.1.1_2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh-server-9.6p1-slfo.1.1_2.1">
      <FullProductName ProductID="openssh-server-9.6p1-slfo.1.1_2.1">openssh-server-9.6p1-slfo.1.1_2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssh-server-config-rootlogin-9.6p1-slfo.1.1_2.1">
      <FullProductName ProductID="openssh-server-config-rootlogin-9.6p1-slfo.1.1_2.1">openssh-server-config-rootlogin-9.6p1-slfo.1.1_2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="openssh-9.6p1-slfo.1.1_2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:openssh-9.6p1-slfo.1.1_2.1">openssh-9.6p1-slfo.1.1_2.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-clients-9.6p1-slfo.1.1_2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:openssh-clients-9.6p1-slfo.1.1_2.1">openssh-clients-9.6p1-slfo.1.1_2.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-common-9.6p1-slfo.1.1_2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:openssh-common-9.6p1-slfo.1.1_2.1">openssh-common-9.6p1-slfo.1.1_2.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-fips-9.6p1-slfo.1.1_2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:openssh-fips-9.6p1-slfo.1.1_2.1">openssh-fips-9.6p1-slfo.1.1_2.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-server-9.6p1-slfo.1.1_2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:openssh-server-9.6p1-slfo.1.1_2.1">openssh-server-9.6p1-slfo.1.1_2.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssh-server-config-rootlogin-9.6p1-slfo.1.1_2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:openssh-server-config-rootlogin-9.6p1-slfo.1.1_2.1">openssh-server-config-rootlogin-9.6p1-slfo.1.1_2.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.</Note>
    </Notes>
    <CVE>CVE-2025-26465</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:openssh-9.6p1-slfo.1.1_2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:openssh-clients-9.6p1-slfo.1.1_2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:openssh-common-9.6p1-slfo.1.1_2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:openssh-fips-9.6p1-slfo.1.1_2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:openssh-server-9.6p1-slfo.1.1_2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:openssh-server-config-rootlogin-9.6p1-slfo.1.1_2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520226-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-26465.html</URL>
        <Description>CVE-2025-26465</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1237040</URL>
        <Description>SUSE Bug 1237040</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1237041</URL>
        <Description>SUSE Bug 1237041</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.</Note>
    </Notes>
    <CVE>CVE-2025-26466</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:openssh-9.6p1-slfo.1.1_2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:openssh-clients-9.6p1-slfo.1.1_2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:openssh-common-9.6p1-slfo.1.1_2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:openssh-fips-9.6p1-slfo.1.1_2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:openssh-server-9.6p1-slfo.1.1_2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:openssh-server-config-rootlogin-9.6p1-slfo.1.1_2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520226-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-26466.html</URL>
        <Description>CVE-2025-26466</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1237041</URL>
        <Description>SUSE Bug 1237041</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
