A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "9.5-p1"
},
{
"introduced": "0"
},
{
"last_affected": "9.6-NA"
},
{
"introduced": "0"
},
{
"last_affected": "9.6-p1"
},
{
"introduced": "0"
},
{
"last_affected": "9.7-NA"
},
{
"introduced": "0"
},
{
"last_affected": "9.7-p1"
},
{
"introduced": "0"
},
{
"last_affected": "9.8-NA"
},
{
"introduced": "0"
},
{
"last_affected": "9.8-p1"
},
{
"introduced": "0"
},
{
"last_affected": "9.9-p1"
}
]
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-26466.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.9-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "24.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "24.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "13.0"
}
]
}
]