CVE-2025-26465
Publication date 18 February 2025
Last updated 19 February 2025
Ubuntu priority
A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
Status
Package | Ubuntu Release | Status |
---|---|---|
openssh | 24.10 oracular |
Fixed 1:9.7p1-7ubuntu4.2
|
24.04 LTS noble |
Fixed 1:9.6p1-3ubuntu13.8
|
|
22.04 LTS jammy |
Fixed 1:8.9p1-3ubuntu0.11
|
|
20.04 LTS focal |
Fixed 1:8.2p1-4ubuntu0.12
|
|
18.04 LTS bionic |
Fixed 1:7.6p1-4ubuntu0.7+esm4
|
|
16.04 LTS xenial |
Fixed 1:7.2p2-4ubuntu2.10+esm7
|
|
openssh-ssh1 | 24.10 oracular | Ignored |
24.04 LTS noble | Ignored | |
22.04 LTS jammy | Ignored | |
20.04 LTS focal | Ignored | |
18.04 LTS bionic | Ignored |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
mdeslaur
openssh-ssh1 is only provided for compatibility with old devices that cannot be upgraded to modern protocols. We will not be providing any security support for the openssh-ssh1 package as it is insecure and should be used in trusted environments only. introduced in 6.8p1
References
Related Ubuntu Security Notices (USN)
- USN-7270-1
- OpenSSH vulnerabilities
- 18 February 2025
- USN-7270-2
- OpenSSH vulnerability
- 18 February 2025