vulnerability
Rocky Linux: CVE-2020-14145: openssh (RLSA-2021-4368)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:P/I:N/A:N) | Jun 29, 2020 | Mar 12, 2024 | Mar 31, 2026 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Jun 29, 2020
Added
Mar 12, 2024
Modified
Mar 31, 2026
Description
The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
Solutions
rocky-upgrade-opensshrocky-upgrade-openssh-askpassrocky-upgrade-openssh-askpass-debuginforocky-upgrade-openssh-cavsrocky-upgrade-openssh-cavs-debuginforocky-upgrade-openssh-clientsrocky-upgrade-openssh-clients-debuginforocky-upgrade-openssh-debuginforocky-upgrade-openssh-debugsourcerocky-upgrade-openssh-keycatrocky-upgrade-openssh-keycat-debuginforocky-upgrade-openssh-ldaprocky-upgrade-openssh-ldap-debuginforocky-upgrade-openssh-serverrocky-upgrade-openssh-server-debuginforocky-upgrade-pam_ssh_agent_authrocky-upgrade-pam_ssh_agent_auth-debuginfo
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.