You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In OpenSSH versions 6.8p1 to 9.9p1, a logic error in ssh(1) allowed an on-path attacker to impersonate any server when the VerifyHostKeyDNS option is enabled. This option is disabled by default.
mend-bolt-for-githubbot
changed the title
CVE-2025-26465 (Medium) detected in freebsd-srce72d86ad9c62c8054d7977a71f08e68ef755c132
CVE-2025-26465 (Medium) detected in multiple libraries
Feb 20, 2025
CVE-2025-26465 - Medium Severity Vulnerability
In OpenSSH versions 6.8p1 to 9.9p1, a logic error in ssh(1) allowed an on-path attacker to impersonate any server when the VerifyHostKeyDNS option is enabled. This option is disabled by default.
Publish Date: 2025-02-18
URL: CVE-2025-26465
Base Score Metrics:
Type: Upgrade version
Origin: https://www.openssh.com/txt/release-9.9p2
Release Date: 2025-02-17
Fix Resolution: https://github.com/openssh/openssh-portable.git - V_9_9_P2
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: