A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Openbsd Subscribe
Openssh Subscribe
Enterprise Linux Subscribe
Openshift Subscribe
Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-7270-1 OpenSSH vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

This issue can be mitigated by setting the following three different options in the sshd configuration file located at: /etc/ssh/sshd_config MaxStartups: Set to a reasonable value, this option controls the maximum number of concurrent unauthenticated connections the SSH server accepts; PerSourcePenalties: Set its suboptions to a reasonable value, this option is used to help sshd to detect and drop connections that are potentially malicious for the SSH server; LoginGraceTime: Set to a resonable value, this option controls how much time the SSH server will wait the client to authenticate before dropping its connection; All the three option above needs to be set to implement a full mitigation for this vulnerability.

History

Tue, 10 Feb 2026 18:30:00 +0000


Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Mon, 03 Nov 2025 20:30:00 +0000


Tue, 27 May 2025 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10
References

Sat, 22 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400

Fri, 21 Mar 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Canonical
Canonical ubuntu Linux
Debian
Debian debian Linux
Openbsd
Openbsd openssh
CPEs cpe:2.3:a:openbsd:openssh:9.5:p1:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.6:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.6:p1:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.7:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.7:p1:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.8:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.8:p1:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.9:-:*:*:*:*:*:*
cpe:2.3:a:openbsd:openssh:9.9:p1:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:24.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:13.0:*:*:*:*:*:*:*
Vendors & Products Canonical
Canonical ubuntu Linux
Debian
Debian debian Linux
Openbsd
Openbsd openssh

Fri, 21 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770

Wed, 05 Mar 2025 04:45:00 +0000


Tue, 04 Mar 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 28 Feb 2025 22:45:00 +0000

Type Values Removed Values Added
References

Fri, 28 Feb 2025 21:30:00 +0000

Type Values Removed Values Added
Title openssh: Denial-of-service in OpenSSH Openssh: denial-of-service in openssh
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References

Wed, 19 Feb 2025 14:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
Title openssh: Denial-of-service in OpenSSH
Weaknesses CWE-400
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-02-10T17:13:57.386Z

Reserved: 2025-02-10T18:31:47.979Z

Link: CVE-2025-26466

cve-icon Vulnrichment

Updated: 2026-02-10T17:13:57.386Z

cve-icon NVD

Status : Modified

Published: 2025-02-28T22:15:40.080

Modified: 2026-02-10T18:16:14.480

Link: CVE-2025-26466

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-02-18T00:00:00Z

Links: CVE-2025-26466 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses