Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-7270-1 | OpenSSH vulnerabilities |
Solution
No solution given by the vendor.
Workaround
This issue can be mitigated by setting the following three different options in the sshd configuration file located at: /etc/ssh/sshd_config MaxStartups: Set to a reasonable value, this option controls the maximum number of concurrent unauthenticated connections the SSH server accepts; PerSourcePenalties: Set its suboptions to a reasonable value, this option is used to help sshd to detect and drop connections that are potentially malicious for the SSH server; LoginGraceTime: Set to a resonable value, this option controls how much time the SSH server will wait the client to authenticate before dropping its connection; All the three option above needs to be set to implement a full mitigation for this vulnerability.
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 27 May 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:10 | |
| References |
|
Sat, 22 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 |
Fri, 21 Mar 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical ubuntu Linux Debian Debian debian Linux Openbsd Openbsd openssh |
|
| CPEs | cpe:2.3:a:openbsd:openssh:9.5:p1:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.6:-:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.6:p1:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.7:-:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.7:p1:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.8:-:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.8:p1:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.9:-:*:*:*:*:*:* cpe:2.3:a:openbsd:openssh:9.9:p1:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Canonical
Canonical ubuntu Linux Debian Debian debian Linux Openbsd Openbsd openssh |
Fri, 21 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-770 |
Wed, 05 Mar 2025 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 04 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 28 Feb 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 28 Feb 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | openssh: Denial-of-service in OpenSSH | Openssh: denial-of-service in openssh |
| First Time appeared |
Redhat
Redhat enterprise Linux Redhat openshift |
|
| CPEs | cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux Redhat openshift |
|
| References |
|
Wed, 19 Feb 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack. | |
| Title | openssh: Denial-of-service in OpenSSH | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-06T23:33:10.047Z
Reserved: 2025-02-10T18:31:47.979Z
Link: CVE-2025-26466
Updated: 2025-11-03T21:12:57.326Z
Status : Modified
Published: 2025-02-28T22:15:40.080
Modified: 2025-11-03T22:18:41.853
Link: CVE-2025-26466
OpenCVE Enrichment
No data.
Ubuntu USN