openssh-8.0p1-29.el8_10

エラータID: AXSA:2026-554:03

Release date: 
Thursday, May 7, 2026 - 14:07
Subject: 
openssh-8.0p1-29.el8_10
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

OpenSSH is an SSH protocol implementation supported by a number of Linux, UNIX, and similar operating systems. It includes the core files necessary for both the OpenSSH client and server.

Security Fix(es):

* OpenSSH: OpenSSH: Privilege escalation via scp legacy protocol when not preserving file mode (CVE-2026-35385)
* OpenSSH: OpenSSH: Security bypass via mishandling of authorized_keys principals option (CVE-2026-35414)
* OpenSSH: OpenSSH: Information disclosure due to unintended cryptographic algorithm usage (CVE-2026-35387)
* OpenSSH: OpenSSH: Low integrity impact from unconfirmed proxy-mode multiplexing sessions (CVE-2026-35388)
* OpenSSH: OpenSSH: Arbitrary command execution via shell metacharacters in username (CVE-2026-35386)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2026-35385
In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).
CVE-2026-35386
In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.
CVE-2026-35387
OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.
CVE-2026-35388
OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.
CVE-2026-35414
OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. openssh-8.0p1-29.el8_10.src.rpm
    MD5: 2029096d6dbafe09f0f46cadb8fad6d5
    SHA-256: 55c5baf4a272ae87a6b26dc1ea0a6d389bcfe055fa05a01dafa6682590f98d33
    Size: 2.90 MB

Asianux Server 8 for x86_64
  1. openssh-8.0p1-29.el8_10.x86_64.rpm
    MD5: 2780fe9d6efeea1e196ffaeb3817fd81
    SHA-256: c2cde2400600fd18bc348fce8d0561c54b7fd946990c651eb2f7b940e0dcfbaf
    Size: 527.04 kB
  2. openssh-askpass-8.0p1-29.el8_10.x86_64.rpm
    MD5: 6444fa398ba24cf34b9241355f5c257c
    SHA-256: 75019691ac4ccaa381911a28fbbee48a89e76ae9a3e18225f0b906240161460e
    Size: 95.72 kB
  3. openssh-cavs-8.0p1-29.el8_10.x86_64.rpm
    MD5: 64e5ae97e3d660cdff17039559c5334f
    SHA-256: 307d5bb198c56928f154cf1c508009043bf4dd62c39c031ec6cab069d391dd73
    Size: 234.29 kB
  4. openssh-clients-8.0p1-29.el8_10.x86_64.rpm
    MD5: 8d02a98f95b99b1787c3a6a9e0221161
    SHA-256: 918af1389f4f5a14171ce0cde3a2cad1f4db19c88e5365c3b7a99511022e26ce
    Size: 647.48 kB
  5. openssh-keycat-8.0p1-29.el8_10.x86_64.rpm
    MD5: 67717b8c850b49b78ec292f1b507d60f
    SHA-256: 3e4bfebff4090490df13f24c0e4edb8a87436ead47fdffc4a346affcf8c20f30
    Size: 119.08 kB
  6. openssh-ldap-8.0p1-29.el8_10.x86_64.rpm
    MD5: 878be29ac88e9478460e869606c79672
    SHA-256: e966fe28fc5fc6030b9091e07cf06f4a9b1477811ed6b6acf47b4eb034a7b22c
    Size: 134.97 kB
  7. openssh-server-8.0p1-29.el8_10.x86_64.rpm
    MD5: e16e1fb12b4e4dfef4b5d0a8d1ff5df5
    SHA-256: e54e570a9b9d6eb7d6f316e40e5b45211b01a8230f4da3339fd321d48287dcc5
    Size: 495.42 kB
  8. pam_ssh_agent_auth-0.10.3-7.29.el8_10.x86_64.rpm
    MD5: 2b1df4bb25a7447aed262078dc87d034
    SHA-256: 40adae181972f3d8cb443891fa46dbe62edc3be8f2de3de09bf8f49b4c5e2caf
    Size: 210.62 kB