openssh-8.0p1-28.el8_10
エラータID: AXSA:2026-408:01
OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.
Security Fix(es):
* openssh: OpenSSH GSSAPI: Information disclosure or denial of service due to uninitialized variables (CVE-2026-3497)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-3497
Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.
Update packages.
Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.
N/A
SRPMS
- openssh-8.0p1-28.el8_10.src.rpm
MD5: 33c33551d695397d845010a64b4cd627
SHA-256: ce40def3a5f0ebcd216777b9e462dc17bb96409cfcf0a0cd503c1ea40fc40779
Size: 2.89 MB
Asianux Server 8 for x86_64
- openssh-8.0p1-28.el8_10.x86_64.rpm
MD5: 0e969215e0253a3355ddb257f81cbb08
SHA-256: 96f65452bac28c735652752daee84def6343b86aae91f2b2476acff5a79ec777
Size: 525.48 kB - openssh-askpass-8.0p1-28.el8_10.x86_64.rpm
MD5: 81409bf8c982c6fb673c2328762c6bcf
SHA-256: b9f43bf1b980c65b615b7acafc9c5d9f1e4dbc2223cfca8fcbf301cf12920e84
Size: 95.06 kB - openssh-cavs-8.0p1-28.el8_10.x86_64.rpm
MD5: 7bc3106b2e9ec39f973798882c2dffc3
SHA-256: 6fbc5d409810ad0cf62537a4450f8ac30543cb080c732c93bffc0050a5324de3
Size: 233.54 kB - openssh-clients-8.0p1-28.el8_10.x86_64.rpm
MD5: 144183315b9d07ec0904ef8be4c871ee
SHA-256: 75ff0fe29a1380fbb0b794780d0e75efabee52e2e8997b94d7573680038b1e09
Size: 645.72 kB - openssh-keycat-8.0p1-28.el8_10.x86_64.rpm
MD5: a04c91b271dfa0d124a106be0d88a40f
SHA-256: f64c05274ac541df01ac7a619bc57cc9af91b94cb98d5756e177002c5ef4527a
Size: 118.35 kB - openssh-ldap-8.0p1-28.el8_10.x86_64.rpm
MD5: a6b7ab75d2549e8c8541993962e5ce1e
SHA-256: 2a6ebd9bc1bba3dce2e4b5f16f13f3bd2ca2b9b83d7af3fdcdc08854a3a91d7f
Size: 134.25 kB - openssh-server-8.0p1-28.el8_10.x86_64.rpm
MD5: f366249023ba747646954299242335c6
SHA-256: fd2a5287093d88c251e757785018c41f61abc5ca8ba3aac706694ac147a9dd40
Size: 494.25 kB - pam_ssh_agent_auth-0.10.3-7.28.el8_10.x86_64.rpm
MD5: 4d38ecc39284c12fb36d1b9a21e02323
SHA-256: 05542702125eae8542ef53bb504682c5d3a74f6bccbc7e59edc8cb3fbd98730c
Size: 209.92 kB