openssh-8.7p1-49.el9_7.ML.1

エラータID: AXSA:2026-555:04

リリース日: 
2026/05/07 Thursday - 14:14
題名: 
openssh-8.7p1-49.el9_7.ML.1
影響のあるチャネル: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.

Security Fix(es):

* OpenSSH: OpenSSH: Privilege escalation via scp legacy protocol when not preserving file mode (CVE-2026-35385)
* OpenSSH: OpenSSH: Security bypass via mishandling of authorized_keys principals option (CVE-2026-35414)
* OpenSSH: OpenSSH: Information disclosure due to unintended cryptographic algorithm usage (CVE-2026-35387)
* OpenSSH: OpenSSH: Low integrity impact from unconfirmed proxy-mode multiplexing sessions (CVE-2026-35388)
* OpenSSH: OpenSSH: Arbitrary command execution via shell metacharacters in username (CVE-2026-35386)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2026-35385
In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).
CVE-2026-35386
In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.
CVE-2026-35387
OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.
CVE-2026-35388
OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.
CVE-2026-35414
OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.

解決策: 

Update packages.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. openssh-8.7p1-49.el9_7.ML.1.src.rpm
    MD5: 8896c397c929c3b8326ab209c8026e05
    SHA-256: ee9858e6a56f821d800c7a7c17ba03cc1e7f14aff7e96983a20c96df9ee532a3
    Size: 2.31 MB

Asianux Server 9 for x86_64
  1. openssh-8.7p1-49.el9_7.ML.1.x86_64.rpm
    MD5: 194eb67fba0eb4dc5418bc57482a710a
    SHA-256: d7f8e8e456a2774a7019ae09a06957ade5cfed6ea35f6f0d06d5c55bf6a80a9c
    Size: 460.35 kB
  2. openssh-askpass-8.7p1-49.el9_7.ML.1.x86_64.rpm
    MD5: 39b48ae025024a63e059598c2613d566
    SHA-256: bf92fade308a5b4a72e8e2a5e00b94e9756bef3f0b21ecebc8efac118d490884
    Size: 17.00 kB
  3. openssh-clients-8.7p1-49.el9_7.ML.1.x86_64.rpm
    MD5: 725d1b4f8cbefd4b040c1c5f4cdb9688
    SHA-256: e0dbca9f61099117ae93a534c7f8d4a174bb3d189e18f348cd6094fc51a26c29
    Size: 713.64 kB
  4. openssh-keycat-8.7p1-49.el9_7.ML.1.x86_64.rpm
    MD5: 3c6ac747daeac7a6055a5ec1f0f513d9
    SHA-256: a0b7cdb85d972acfdc4cbe64c4ce5c35bc6f42571a77db0f74825adc02da600d
    Size: 18.51 kB
  5. openssh-server-8.7p1-49.el9_7.ML.1.x86_64.rpm
    MD5: 250d742f3ed379f1030e23aa708a32ca
    SHA-256: 9a379e0aaf863995fbf7b2cb1f1987db821f12eba3638d829b433ca9cc740644
    Size: 461.38 kB
  6. pam_ssh_agent_auth-0.10.4-5.49.el9_7.ML.1.x86_64.rpm
    MD5: 6fa9bc2611c21160c1f3e1e91ed2e107
    SHA-256: 9ab3e9ec47cf57416cfe9b2814c74058c195922c86899c9f288eb0454249407a
    Size: 65.31 kB