-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2026-2cedc95af8 2026-04-28 00:55:52.209308+00:00 --------------------------------------------------------------------------------
Name : openssh Product : Fedora 43 Version : 10.0p1 Release : 9.fc43 URL : http://www.openssh.com/portable.html Summary : An open source implementation of SSH protocol version 2 Description : SSH (Secure SHell) is a program for logging into and executing commands on a remote machine. SSH is intended to replace rlogin and rsh, and to provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's version of the last free version of SSH, bringing it up to date in terms of security and features. This package includes the core files necessary for both the OpenSSH client and server. To make this package useful, you should also install openssh-clients, openssh-server, or both. -------------------------------------------------------------------------------- Update Information: CVE-2026-35385: Fix privilege escalation via scp legacy protocol when not in preserving file mode CVE-2026-35388: Add connection multiplexing confirmation for proxy-mode multiplexing sessions CVE-2026-35387: Fix incomplete application of PubkeyAcceptedAlgorithms and HostbasedAcceptedAlgorithms with regard to ECDSA keys CVE-2026-35414: Fix mishandling of authorized_keys principals option CVE-2026-35386: Add validation rules to usernames and hostnames set for ProxyJump/-J on the commandline -------------------------------------------------------------------------------- ChangeLog: * Fri Apr 17 2026 Zoltan Fridrich <[email protected]> - 10.0p1-9 - CVE-2026-35385: Fix privilege escalation via scp legacy protocol when not in preserving file mode Resolves: rhbz#2454941 - CVE-2026-35388: Add connection multiplexing confirmation for proxy-mode multiplexing sessions Resolves: rhbz#2454951 - CVE-2026-35387: Fix incomplete application of PubkeyAcceptedAlgorithms and HostbasedAcceptedAlgorithms with regard to ECDSA keys Resolves: rhbz#2454944 - CVE-2026-35414: Fix mishandling of authorized_keys principals option Resolves: rhbz#2454943 - CVE-2025-61985: Reject URL-strings with NULL characters - CVE-2025-61984, CVE-2026-35386: Reject usernames with control characters Resolves: rhbz#2454961 -------------------------------------------------------------------------------- References: [ 1 ] Bug #2454941 - CVE-2026-35385 openssh: OpenSSH: Privilege escalation via scp legacy protocol when not preserving file mode [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2454941 [ 2 ] Bug #2454943 - CVE-2026-35414 openssh: OpenSSH: Security bypass via mishandling of authorized_keys principals option [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2454943 [ 3 ] Bug #2454944 - CVE-2026-35387 openssh: OpenSSH: Information disclosure due to unintended cryptographic algorithm usage [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2454944 [ 4 ] Bug #2454951 - CVE-2026-35388 openssh: OpenSSH: Low integrity impact from unconfirmed proxy-mode multiplexing sessions [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2454951 [ 5 ] Bug #2454961 - CVE-2026-35386 openssh: OpenSSH: Arbitrary command execution via shell metacharacters in username [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2454961 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2026-2cedc95af8' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- -- _______________________________________________ package-announce mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/[email protected] Do not reply to spam, report it: https://forge.fedoraproject.org/infra/tickets/issues/new
