TPS-2025-001 OpenSSH CVE-2025-26465 & CVE-2025-26465
Overview
The Qualys Security Advisory team discovered two vulnerabilities in OpenSSH 9.9p1. From the OpenSSH 9.9p2 release notes:
-
CVE-2025-26465 - ssh(1) in OpenSSH versions 6.8p1 to 9.9p1 (inclusive) contained a logic error that allowed an on-path attacker (a.k.a MITM) to impersonate any server when the
VerifyHostKeyDNS
option is enabled. This option is off by default. -
CVE-2025-26466 - sshd(8) in OpenSSH versions 9.5p1 to 9.9p1 (inclusive) is vulnerable to a memory/CPU denial-of-service related to the handling of SSH2_MSG_PING packets. This condition may be mitigated using the existing PerSourcePenalties feature.
Actions Taken by Us
The latest SmartOS platform release contains OpenSSH 9.9p2. We recommend you update to this platform, via any of the methods mentioned below.
Actions You Need to Take
Workaround
CVE-2025-26455 is only an issue if the VerifyHostKeyDNS
option is enabled,
which is not in default OpenSSH, nor in default SmartOS.
CVE-2025-26466 can be mitigated by further use of the PerSourcePenalties
option in sshd_config
(5). Using this option for SmartOS global zones means
re-enabling it in /etc/ssh/sshd_config
upon every boot (including
restarting the ssh
service). SmartOS non-global zones can have persistent
changes for this in /etc/ssh/sshd_config
.
SmartOS users (Triton or stand-alone)
Compute nodes should be rebooted to platform image 20250220T074131Z or later to eliminate the potential vulnerability.
For Triton users
Execute the following commands from the headnode.
sdcadm platform install 20250220T074131Z -C release
sdcadm platform assign 20250220T074131Z --all
sdcadm platform set-default 20250220T074131Z
Schedule reboots for all compute nodes.
For SmartOS users with piadm
piadm install 20250220T074131Z
piadm activate 20250220T074131Z
Reboot the node.
For other SmartOS users
Update your boot media to use image 20250220T074131Z then reboot the node. Boot images are available from:
https://us-central.manta.mnx.io/Joyent_Dev/public/SmartOS/smartos.html
Support
If you are a MNX customer and have any further questions or concerns after reading the information provided above, please contact MNX Support.
If you are an Open Source SmartOS/Triton user, please direct any further questions to the SmartOS Community Mailing Lists and IRC.