USN-7270-1

Source
https://ubuntu.com/security/notices/USN-7270-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7270-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7270-1
Upstream
Related
Published
2025-02-18T13:04:34.888499Z
Modified
2025-10-13T04:39:42Z
Summary
openssh vulnerabilities
Details

It was discovered that the OpenSSH client incorrectly handled the non-default VerifyHostKeyDNS option. If that option were enabled, an attacker could possibly impersonate a server by completely bypassing the server identity check. (CVE-2025-26465)

It was discovered that OpenSSH incorrectly handled the transport-level ping facility. A remote attacker could possibly use this issue to cause OpenSSH clients and servers to consume resources, leading to a denial of service. This issue only affected Ubuntu 24.04 LTS and Ubuntu 24.10. (CVE-2025-26466)

References

Affected packages

Ubuntu:20.04:LTS / openssh

Package

Name
openssh
Purl
pkg:deb/ubuntu/openssh@1:8.2p1-4ubuntu0.12?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:8.2p1-4ubuntu0.12

Affected versions

1:8.*

1:8.0p1-6build1
1:8.1p1-1
1:8.1p1-5
1:8.2p1-4
1:8.2p1-4ubuntu0.1
1:8.2p1-4ubuntu0.2
1:8.2p1-4ubuntu0.3
1:8.2p1-4ubuntu0.4
1:8.2p1-4ubuntu0.5
1:8.2p1-4ubuntu0.7
1:8.2p1-4ubuntu0.8
1:8.2p1-4ubuntu0.9
1:8.2p1-4ubuntu0.10
1:8.2p1-4ubuntu0.11

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:8.2p1-4ubuntu0.12",
            "binary_name": "openssh-client"
        },
        {
            "binary_version": "1:8.2p1-4ubuntu0.12",
            "binary_name": "openssh-server"
        },
        {
            "binary_version": "1:8.2p1-4ubuntu0.12",
            "binary_name": "openssh-sftp-server"
        },
        {
            "binary_version": "1:8.2p1-4ubuntu0.12",
            "binary_name": "openssh-tests"
        },
        {
            "binary_version": "1:8.2p1-4ubuntu0.12",
            "binary_name": "ssh"
        },
        {
            "binary_version": "1:8.2p1-4ubuntu0.12",
            "binary_name": "ssh-askpass-gnome"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:20.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-26465"
        }
    ]
}

Ubuntu:22.04:LTS / openssh

Package

Name
openssh
Purl
pkg:deb/ubuntu/openssh@1:8.9p1-3ubuntu0.11?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:8.9p1-3ubuntu0.11

Affected versions

1:8.*

1:8.4p1-6ubuntu2
1:8.7p1-2
1:8.7p1-2build1
1:8.7p1-4
1:8.8p1-1
1:8.9p1-3
1:8.9p1-3ubuntu0.1
1:8.9p1-3ubuntu0.3
1:8.9p1-3ubuntu0.4
1:8.9p1-3ubuntu0.5
1:8.9p1-3ubuntu0.6
1:8.9p1-3ubuntu0.7
1:8.9p1-3ubuntu0.10

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:8.9p1-3ubuntu0.11",
            "binary_name": "openssh-client"
        },
        {
            "binary_version": "1:8.9p1-3ubuntu0.11",
            "binary_name": "openssh-server"
        },
        {
            "binary_version": "1:8.9p1-3ubuntu0.11",
            "binary_name": "openssh-sftp-server"
        },
        {
            "binary_version": "1:8.9p1-3ubuntu0.11",
            "binary_name": "openssh-tests"
        },
        {
            "binary_version": "1:8.9p1-3ubuntu0.11",
            "binary_name": "ssh"
        },
        {
            "binary_version": "1:8.9p1-3ubuntu0.11",
            "binary_name": "ssh-askpass-gnome"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:22.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-26465"
        }
    ]
}

Ubuntu:24.04:LTS / openssh

Package

Name
openssh
Purl
pkg:deb/ubuntu/openssh@1:9.6p1-3ubuntu13.8?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:9.6p1-3ubuntu13.8

Affected versions

1:9.*

1:9.3p1-1ubuntu3
1:9.4p1-1ubuntu1
1:9.6p1-3ubuntu1
1:9.6p1-3ubuntu2
1:9.6p1-3ubuntu11
1:9.6p1-3ubuntu12
1:9.6p1-3ubuntu13
1:9.6p1-3ubuntu13.3
1:9.6p1-3ubuntu13.4
1:9.6p1-3ubuntu13.5
1:9.6p1-3ubuntu13.7

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:9.6p1-3ubuntu13.8",
            "binary_name": "openssh-client"
        },
        {
            "binary_version": "1:9.6p1-3ubuntu13.8",
            "binary_name": "openssh-server"
        },
        {
            "binary_version": "1:9.6p1-3ubuntu13.8",
            "binary_name": "openssh-sftp-server"
        },
        {
            "binary_version": "1:9.6p1-3ubuntu13.8",
            "binary_name": "openssh-tests"
        },
        {
            "binary_version": "1:9.6p1-3ubuntu13.8",
            "binary_name": "ssh"
        },
        {
            "binary_version": "1:9.6p1-3ubuntu13.8",
            "binary_name": "ssh-askpass-gnome"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:24.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-26465"
        },
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-26466"
        }
    ]
}