openssh-8.7p1-49.el9_7.ML.1
エラータID: AXSA:2026-555:04
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* OpenSSH: OpenSSH: Privilege escalation via scp legacy protocol when not preserving file mode (CVE-2026-35385)
* OpenSSH: OpenSSH: Security bypass via mishandling of authorized_keys principals option (CVE-2026-35414)
* OpenSSH: OpenSSH: Information disclosure due to unintended cryptographic algorithm usage (CVE-2026-35387)
* OpenSSH: OpenSSH: Low integrity impact from unconfirmed proxy-mode multiplexing sessions (CVE-2026-35388)
* OpenSSH: OpenSSH: Arbitrary command execution via shell metacharacters in username (CVE-2026-35386)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-35385
In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).
CVE-2026-35386
In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.
CVE-2026-35387
OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.
CVE-2026-35388
OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.
CVE-2026-35414
OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.
Update packages.
In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).
In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.
OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.
OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.
OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.
N/A
SRPMS
- openssh-8.7p1-49.el9_7.ML.1.src.rpm
MD5: 8896c397c929c3b8326ab209c8026e05
SHA-256: ee9858e6a56f821d800c7a7c17ba03cc1e7f14aff7e96983a20c96df9ee532a3
Size: 2.31 MB
Asianux Server 9 for x86_64
- openssh-8.7p1-49.el9_7.ML.1.x86_64.rpm
MD5: 194eb67fba0eb4dc5418bc57482a710a
SHA-256: d7f8e8e456a2774a7019ae09a06957ade5cfed6ea35f6f0d06d5c55bf6a80a9c
Size: 460.35 kB - openssh-askpass-8.7p1-49.el9_7.ML.1.x86_64.rpm
MD5: 39b48ae025024a63e059598c2613d566
SHA-256: bf92fade308a5b4a72e8e2a5e00b94e9756bef3f0b21ecebc8efac118d490884
Size: 17.00 kB - openssh-clients-8.7p1-49.el9_7.ML.1.x86_64.rpm
MD5: 725d1b4f8cbefd4b040c1c5f4cdb9688
SHA-256: e0dbca9f61099117ae93a534c7f8d4a174bb3d189e18f348cd6094fc51a26c29
Size: 713.64 kB - openssh-keycat-8.7p1-49.el9_7.ML.1.x86_64.rpm
MD5: 3c6ac747daeac7a6055a5ec1f0f513d9
SHA-256: a0b7cdb85d972acfdc4cbe64c4ce5c35bc6f42571a77db0f74825adc02da600d
Size: 18.51 kB - openssh-server-8.7p1-49.el9_7.ML.1.x86_64.rpm
MD5: 250d742f3ed379f1030e23aa708a32ca
SHA-256: 9a379e0aaf863995fbf7b2cb1f1987db821f12eba3638d829b433ca9cc740644
Size: 461.38 kB - pam_ssh_agent_auth-0.10.4-5.49.el9_7.ML.1.x86_64.rpm
MD5: 6fa9bc2611c21160c1f3e1e91ed2e107
SHA-256: 9ab3e9ec47cf57416cfe9b2814c74058c195922c86899c9f288eb0454249407a
Size: 65.31 kB