First published: Tue Feb 18 2025(Updated: )
USN-7270-1 fixed a vulnerability in OpenSSH. This update provides the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory details: It was discovered that the OpenSSH client incorrectly handled the non-default VerifyHostKeyDNS option. If that option were enabled, an attacker could possibly impersonate a server by completely bypassing the server identity check. (CVE-2025-26465)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/openssh-client | <1:7.6p1-4ubuntu0.7+esm4 | 1:7.6p1-4ubuntu0.7+esm4 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/openssh-server | <1:7.6p1-4ubuntu0.7+esm4 | 1:7.6p1-4ubuntu0.7+esm4 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/openssh-client | <1:7.2p2-4ubuntu2.10+esm7 | 1:7.2p2-4ubuntu2.10+esm7 |
Ubuntu | =16.04 | |
All of | ||
ubuntu/openssh-server | <1:7.2p2-4ubuntu2.10+esm7 | 1:7.2p2-4ubuntu2.10+esm7 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7270-2 is critical due to the risk it poses to the OpenSSH client and server.
To fix USN-7270-2, you should update the OpenSSH packages to the recommended versions: 1:7.6p1-4ubuntu0.7+esm4 for Ubuntu 18.04 LTS and 1:7.2p2-4ubuntu2.10+esm7 for Ubuntu 16.04 LTS.
USN-7270-2 affects OpenSSH client and server versions 1:7.6p1-4ubuntu0.7+esm4 for Ubuntu 18.04 LTS and 1:7.2p2-4ubuntu2.10+esm7 for Ubuntu 16.04 LTS.
USN-7270-2 is particularly relevant for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS users who utilize OpenSSH.
USN-7270-2 addresses a flaw in how OpenSSH handles the non-default VerifyHostKeyDNS option.