<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE3-SA-2025-0120</id>
    <title>An update for openssh is now available for HCE 3.0</title>
    <severity>Important</severity>
    <release>HCE 3.0</release>
    <issued date="2025-10-09 06:38:18"/>
    <updated date="2025-10-09 06:38:18"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-39894" id="CVE-2024-39894" title="CVE-2024-39894 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-32728" id="CVE-2025-32728" title="CVE-2025-32728 Base Score: 3.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-51384" id="CVE-2023-51384" title="CVE-2023-51384 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-36368" id="CVE-2021-36368" title="CVE-2021-36368 Base Score: 3.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-26465" id="CVE-2025-26465" title="CVE-2025-26465 Base Score: 6.8 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-26466" id="CVE-2025-26466" title="CVE-2025-26466 Base Score: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

OpenSSH 9.5 through 9.7 before 9.8 sometimes allows timing attacks against echo-off password entry (e.g., for su and Sudo) because of an ObscureKeystrokeTiming logic error. Similarly, other timing attacks against keystroke entry could occur. (CVE-2024-39894)

In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding. (CVE-2025-32728)

In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys. (CVE-2023-51384)

An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user_x27;s behalf. NOTE: the vendor_x27;s position is &quot;this is not an authentication bypass, since nothing is being bypassed. (CVE-2021-36368)

A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client_x27;s memory resource first, turning the attack complexity high. (CVE-2025-26465)

A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack. (CVE-2025-26466)
</description>
    <pkglist>
      <collection short="HCE 3.0" package="openssh">
        <name>HCE 3.0</name>
        <package arch="x86_64" name="openssh" version="9.6p1" release="3.r15.hce3">
          <filename>openssh-9.6p1-3.r15.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="openssh-askpass" version="9.6p1" release="3.r15.hce3">
          <filename>openssh-askpass-9.6p1-3.r15.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="openssh-clients" version="9.6p1" release="3.r15.hce3">
          <filename>openssh-clients-9.6p1-3.r15.hce3.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="openssh-help" version="9.6p1" release="3.r15.hce3">
          <filename>openssh-help-9.6p1-3.r15.hce3.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="openssh-keycat" version="9.6p1" release="3.r15.hce3">
          <filename>openssh-keycat-9.6p1-3.r15.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="openssh-server" version="9.6p1" release="3.r15.hce3">
          <filename>openssh-server-9.6p1-3.r15.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="pam_ssh_agent_auth" version="0.10.4" release="5.3.r15.hce3">
          <filename>pam_ssh_agent_auth-0.10.4-5.3.r15.hce3.x86_64.rpm</filename>
        </package>
        <package arch="aarch64" name="openssh" version="9.6p1" release="3.r15.hce3">
          <filename>openssh-9.6p1-3.r15.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="openssh-askpass" version="9.6p1" release="3.r15.hce3">
          <filename>openssh-askpass-9.6p1-3.r15.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="openssh-clients" version="9.6p1" release="3.r15.hce3">
          <filename>openssh-clients-9.6p1-3.r15.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="openssh-keycat" version="9.6p1" release="3.r15.hce3">
          <filename>openssh-keycat-9.6p1-3.r15.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="openssh-server" version="9.6p1" release="3.r15.hce3">
          <filename>openssh-server-9.6p1-3.r15.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="pam_ssh_agent_auth" version="0.10.4" release="5.3.r15.hce3">
          <filename>pam_ssh_agent_auth-0.10.4-5.3.r15.hce3.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
