openssh-8.0p1-29.el8_10
エラータID: AXSA:2026-554:03
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* OpenSSH: OpenSSH: Privilege escalation via scp legacy protocol when not preserving file mode (CVE-2026-35385)
* OpenSSH: OpenSSH: Security bypass via mishandling of authorized_keys principals option (CVE-2026-35414)
* OpenSSH: OpenSSH: Information disclosure due to unintended cryptographic algorithm usage (CVE-2026-35387)
* OpenSSH: OpenSSH: Low integrity impact from unconfirmed proxy-mode multiplexing sessions (CVE-2026-35388)
* OpenSSH: OpenSSH: Arbitrary command execution via shell metacharacters in username (CVE-2026-35386)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-35385
In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).
CVE-2026-35386
In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.
CVE-2026-35387
OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.
CVE-2026-35388
OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.
CVE-2026-35414
OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.
Update packages.
In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).
In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.
OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.
OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.
OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.
N/A
SRPMS
- openssh-8.0p1-29.el8_10.src.rpm
MD5: 2029096d6dbafe09f0f46cadb8fad6d5
SHA-256: 55c5baf4a272ae87a6b26dc1ea0a6d389bcfe055fa05a01dafa6682590f98d33
Size: 2.90 MB
Asianux Server 8 for x86_64
- openssh-8.0p1-29.el8_10.x86_64.rpm
MD5: 2780fe9d6efeea1e196ffaeb3817fd81
SHA-256: c2cde2400600fd18bc348fce8d0561c54b7fd946990c651eb2f7b940e0dcfbaf
Size: 527.04 kB - openssh-askpass-8.0p1-29.el8_10.x86_64.rpm
MD5: 6444fa398ba24cf34b9241355f5c257c
SHA-256: 75019691ac4ccaa381911a28fbbee48a89e76ae9a3e18225f0b906240161460e
Size: 95.72 kB - openssh-cavs-8.0p1-29.el8_10.x86_64.rpm
MD5: 64e5ae97e3d660cdff17039559c5334f
SHA-256: 307d5bb198c56928f154cf1c508009043bf4dd62c39c031ec6cab069d391dd73
Size: 234.29 kB - openssh-clients-8.0p1-29.el8_10.x86_64.rpm
MD5: 8d02a98f95b99b1787c3a6a9e0221161
SHA-256: 918af1389f4f5a14171ce0cde3a2cad1f4db19c88e5365c3b7a99511022e26ce
Size: 647.48 kB - openssh-keycat-8.0p1-29.el8_10.x86_64.rpm
MD5: 67717b8c850b49b78ec292f1b507d60f
SHA-256: 3e4bfebff4090490df13f24c0e4edb8a87436ead47fdffc4a346affcf8c20f30
Size: 119.08 kB - openssh-ldap-8.0p1-29.el8_10.x86_64.rpm
MD5: 878be29ac88e9478460e869606c79672
SHA-256: e966fe28fc5fc6030b9091e07cf06f4a9b1477811ed6b6acf47b4eb034a7b22c
Size: 134.97 kB - openssh-server-8.0p1-29.el8_10.x86_64.rpm
MD5: e16e1fb12b4e4dfef4b5d0a8d1ff5df5
SHA-256: e54e570a9b9d6eb7d6f316e40e5b45211b01a8230f4da3339fd321d48287dcc5
Size: 495.42 kB - pam_ssh_agent_auth-0.10.3-7.29.el8_10.x86_64.rpm
MD5: 2b1df4bb25a7447aed262078dc87d034
SHA-256: 40adae181972f3d8cb443891fa46dbe62edc3be8f2de3de09bf8f49b4c5e2caf
Size: 210.62 kB