[CLSA-2025:1743415556] openssh: Fix of CVE-2025-26465
Type:
security
Severity:
Moderate
Release date:
2025-03-31 10:06:01 UTC
Description:
- CVE-2025-26465: fix vulnerability in OpenSSH when the VerifyHostKeyDNS option is enabled - enlarge format buffer size for certificate serial number so the log message can record any 64-bit integer without truncation (openssh bz#3012) [Orabug: 30448895]
Updated packages:
  • openssh-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:00b018bb8b7e79232999896b79a93f5245082bb1012fcffd8a77fb2d883d8ee6
  • openssh-askpass-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:c4fbb3648b3a1748a9db1089b0bdec876069ff3e7251e33f9b78b9a0bae35460
  • openssh-cavs-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:ce0a75cadd9891dc1d2fac5fb2a0efb73294d962ecc2553580840e3cc3ab72ad
  • openssh-clients-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:3d0f53acf3c5dfbb5cd76582b0999ad2be79e2c6df65a8442805c72c49a1df79
  • openssh-keycat-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:0df9ef4b7873412ab3a0e6859f45ebbe8f2354f66eabf1e562e9b788cd94f9f6
  • openssh-ldap-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:2daf9599b09b8cfc4eb0fed98934aa62f8ea557dbd48e5eb39e7b9b9b341b61e
  • openssh-server-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:f291f80d697c734f9661a04bf480cffe08ba3410c7023600ad550e80a4a48a87
  • openssh-server-sysvinit-7.4p1-23.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:1bc6c5d5045e1189adf938eac603dd72f39c8c81a6d2e187c25b5b8e1c7cd91a
  • pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els1.i686.rpm
    sha:aa0fc6fa1aff30df83d49c1cc991e67f6b21e51755859fd0e474408ebc8a20a4
  • pam_ssh_agent_auth-0.10.3-2.23.0.3.el7_9.tuxcare.els1.x86_64.rpm
    sha:db799340b0a823a563b788e5f7b16779d81f60546a299d43c837cf0be326276d
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.