The vulnerability (CVE-2025-26466) is a denial-of-service caused by uncontrolled memory consumption due to handling of SSH2_MSG_PING packets. The Qualys security advisory explicitly states this was introduced by commit dce6d80, which added the transport-level ping facility.
The commit dce6d80 modifies the function ssh_packet_read_poll_seqnr in packet.c to process SSH2_MSG_PING. This function reads the PING data, creates a PONG packet, and then calls sshpkt_send(ssh).
The vulnerability manifests because, as detailed in the advisory, during a key exchange, sshpkt_send (which calls ssh_packet_send2) queues these PONG packets. Each queued packet involves a new memory allocation (specifically, ssh_packet_send2 calls sshbuf_new()) that isn't freed until the key exchange is complete. This allows an attacker to send many PING packets, leading to excessive memory allocation for the queued PONGs, resulting in a DoS.
Therefore, ssh_packet_read_poll_seqnr is identified as the vulnerable function because its modification in commit dce6d80 introduced the processing of PINGs that triggers this memory exhaustion behavior in conjunction with the existing packet queuing mechanism in ssh_packet_send2.