A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
| Software | From | Fixed in |
|---|---|---|
| openbsd / openssh | 9.8 | 9.8.x |
| openbsd / openssh | 9.9 | 9.9.x |
| openbsd / openssh | 9.9-p1 | 9.9-p1.x |
| openbsd / openssh | 9.5-p1 | 9.5-p1.x |
| openbsd / openssh | 9.6 | 9.6.x |
| openbsd / openssh | 9.6-p1 | 9.6-p1.x |
| openbsd / openssh | 9.7 | 9.7.x |
| openbsd / openssh | 9.7-p1 | 9.7-p1.x |
| openbsd / openssh | 9.8-p1 | 9.8-p1.x |
| canonical / ubuntu_linux | 24.04 | 24.04.x |
| canonical / ubuntu_linux | 24.10 | 24.10.x |
| debian / debian_linux | 11.0 | 11.0.x |
| debian / debian_linux | 12.0 | 12.0.x |
| debian / debian_linux | 13.0 | 13.0.x |