First published: Tue Feb 18 2025(Updated: )
It was discovered that the OpenSSH client incorrectly handled the non-default VerifyHostKeyDNS option. If that option were enabled, an attacker could possibly impersonate a server by completely bypassing the server identity check. (CVE-2025-26465) It was discovered that OpenSSH incorrectly handled the transport-level ping facility. A remote attacker could possibly use this issue to cause OpenSSH clients and servers to consume resources, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-26466)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/openssh-client | <1:9.7p1-7ubuntu4.2 | 1:9.7p1-7ubuntu4.2 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/openssh-server | <1:9.7p1-7ubuntu4.2 | 1:9.7p1-7ubuntu4.2 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/openssh-client | <1:9.6p1-3ubuntu13.8 | 1:9.6p1-3ubuntu13.8 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/openssh-server | <1:9.6p1-3ubuntu13.8 | 1:9.6p1-3ubuntu13.8 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/openssh-client | <1:8.9p1-3ubuntu0.11 | 1:8.9p1-3ubuntu0.11 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/openssh-server | <1:8.9p1-3ubuntu0.11 | 1:8.9p1-3ubuntu0.11 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/openssh-client | <1:8.2p1-4ubuntu0.12 | 1:8.2p1-4ubuntu0.12 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/openssh-server | <1:8.2p1-4ubuntu0.12 | 1:8.2p1-4ubuntu0.12 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-7270-1 describes a security issue in OpenSSH where attackers could impersonate a server due to improper handling of the VerifyHostKeyDNS option.
To fix the vulnerability in USN-7270-1, update your OpenSSH packages to the recommended versions: 1:9.7p1-7ubuntu4.2 for Ubuntu 24.10, 1:9.6p1-3ubuntu13.8 for Ubuntu 24.04, and 1:8.9p1-3ubuntu0.11 for Ubuntu 22.04.
Affected versions include OpenSSH client and server versions before 1:9.7p1-7ubuntu4.2, 1:9.6p1-3ubuntu13.8, and 1:8.9p1-3ubuntu0.11 based on your Ubuntu release.
The vulnerability described in USN-7270-1 was discovered by the security research community, specifically relating to OpenSSH's handling of DNS-based server verification.
Yes, the vulnerability in USN-7270-1 is critical as it allows attackers to bypass server identity checks, potentially leading to man-in-the-middle attacks.