[El-errata] ELSA-2026-13380 Important: Oracle Linux 10 openssh security update
Errata Announcements for Oracle Linux
el-errata at oss.oracle.com
Wed May 6 22:13:55 UTC 2026
Oracle Linux Security Advisory ELSA-2026-13380
http://linux.oracle.com/errata/ELSA-2026-13380.html
The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:
x86_64:
openssh-9.9p1-14.0.1.el10_1.x86_64.rpm
openssh-askpass-9.9p1-14.0.1.el10_1.x86_64.rpm
openssh-clients-9.9p1-14.0.1.el10_1.x86_64.rpm
openssh-keycat-9.9p1-14.0.1.el10_1.x86_64.rpm
openssh-keysign-9.9p1-14.0.1.el10_1.x86_64.rpm
openssh-server-9.9p1-14.0.1.el10_1.x86_64.rpm
aarch64:
openssh-9.9p1-14.0.1.el10_1.aarch64.rpm
openssh-askpass-9.9p1-14.0.1.el10_1.aarch64.rpm
openssh-clients-9.9p1-14.0.1.el10_1.aarch64.rpm
openssh-keycat-9.9p1-14.0.1.el10_1.aarch64.rpm
openssh-keysign-9.9p1-14.0.1.el10_1.aarch64.rpm
openssh-server-9.9p1-14.0.1.el10_1.aarch64.rpm
SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/openssh-9.9p1-14.0.1.el10_1.src.rpm
Related CVEs:
CVE-2026-35385
CVE-2026-35386
CVE-2026-35387
CVE-2026-35388
CVE-2026-35414
Description of changes:
[9.9p1-14.0.1]
- Upstream references found with /usr/bin/ssh [Orabug: 37824421]
[9.9p1-14]
- CVE-2026-35385: Fix privilege escalation via scp legacy protocol
when not in preserving file mode
Resolves: RHEL-164738
- CVE-2026-35388: Add connection multiplexing confirmation for proxy-mode
multiplexing sessions
Resolves: RHEL-166237
- CVE-2026-35387: Fix incomplete application of PubkeyAcceptedAlgorithms
and HostbasedAcceptedAlgorithms with regard to ECDSA keys
Resolves: RHEL-166221
- CVE-2026-35414: Fix mishandling of authorized_keys principals option
Resolves: RHEL-166189
- CVE-2026-35386: Add validation rules to usernames and hostnames
set for ProxyJump/-J on the commandline
Resolves: RHEL-166205
More information about the El-errata
mailing list