Skip to content

Conversation

@casibbald
Copy link

@casibbald casibbald commented Jun 25, 2025

Details

CVE-2024-6387 - High - https://app.aikido.dev/issues/12049190/detail#CVE-2024-6387

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVE-2025-26465 - Medium - https://app.aikido.dev/issues/12049190/detail#CVE-2025-26465

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVE-2025-26466 - Medium - https://app.aikido.dev/issues/12049190/detail#CVE-2025-26466

A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.

CVE-2024-6387 - https://app.aikido.dev/issues/12049190/detail#CVE-2024-6387
CVE-2025-26465 - https://app.aikido.dev/issues/12049190/detail#CVE-2025-26465
CVE-2025-26466 - https://app.aikido.dev/issues/12049190/detail#CVE-2025-26466

## Details

CVE-2024-6387 - High

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

CVE-2025-26465 - Medium

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.

CVE-2025-26466 - Medium

A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
@casibbald casibbald changed the title security: security: OpenSSH CVE's in 1.3.0 Jun 25, 2025
@casibbald casibbald closed this Jun 25, 2025
@matheuscscp
Copy link
Member

Those CVEs are fixed in the latest kustomize-controller version.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants