[CLSA-2025:1766136770] Fix CVE(s): CVE-2025-26465
Type:
security
Severity:
Moderate
Release date:
2025-12-19 09:32:53 UTC
Description:
* SECURITY UPDATE: VerifyHostKeyDNS server impersonation - debian/patches/CVE-2025-26465.patch: Fix cases where error codes were not correctly set - CVE-2025-26465
Updated packages:
  • openssh-client_7.9p1-10+deb10u4+tuxcare.els1_amd64.deb
    sha:d6d3a62ae52c08b84d505c4c32dd8bf1147c31b9
  • openssh-server_7.9p1-10+deb10u4+tuxcare.els1_amd64.deb
    sha:112605b9718c54d8727bfd499672a3c771ba8526
  • openssh-sftp-server_7.9p1-10+deb10u4+tuxcare.els1_amd64.deb
    sha:d5500435c1028fb8a18ef6598b61596f77b88265
  • openssh-tests_7.9p1-10+deb10u4+tuxcare.els1_amd64.deb
    sha:92460bf35bb5096eaf92566874f6f6ea4d95a065
  • ssh_7.9p1-10+deb10u4+tuxcare.els1_all.deb
    sha:ce2c3c02881de42b1aee90e780190ba2c488b8e9
  • ssh-askpass-gnome_7.9p1-10+deb10u4+tuxcare.els1_amd64.deb
    sha:7bd13c2feb16954cd63c23ddcc6a94b4e88ef0d6
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.