[El-errata] ELSA-2026-13380 Important: Oracle Linux 10 openssh security update

Errata Announcements for Oracle Linux el-errata at oss.oracle.com
Wed May 6 22:13:55 UTC 2026


Oracle Linux Security Advisory ELSA-2026-13380

http://linux.oracle.com/errata/ELSA-2026-13380.html

The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

x86_64:
openssh-9.9p1-14.0.1.el10_1.x86_64.rpm
openssh-askpass-9.9p1-14.0.1.el10_1.x86_64.rpm
openssh-clients-9.9p1-14.0.1.el10_1.x86_64.rpm
openssh-keycat-9.9p1-14.0.1.el10_1.x86_64.rpm
openssh-keysign-9.9p1-14.0.1.el10_1.x86_64.rpm
openssh-server-9.9p1-14.0.1.el10_1.x86_64.rpm

aarch64:
openssh-9.9p1-14.0.1.el10_1.aarch64.rpm
openssh-askpass-9.9p1-14.0.1.el10_1.aarch64.rpm
openssh-clients-9.9p1-14.0.1.el10_1.aarch64.rpm
openssh-keycat-9.9p1-14.0.1.el10_1.aarch64.rpm
openssh-keysign-9.9p1-14.0.1.el10_1.aarch64.rpm
openssh-server-9.9p1-14.0.1.el10_1.aarch64.rpm


SRPMS:
http://oss.oracle.com/ol10/SRPMS-updates/openssh-9.9p1-14.0.1.el10_1.src.rpm

Related CVEs:

CVE-2026-35385
CVE-2026-35386
CVE-2026-35387
CVE-2026-35388
CVE-2026-35414




Description of changes:

[9.9p1-14.0.1]
- Upstream references found with /usr/bin/ssh [Orabug: 37824421]

[9.9p1-14]
- CVE-2026-35385: Fix privilege escalation via scp legacy protocol
  when not in preserving file mode
  Resolves: RHEL-164738
- CVE-2026-35388: Add connection multiplexing confirmation for proxy-mode
  multiplexing sessions
  Resolves: RHEL-166237
- CVE-2026-35387: Fix incomplete application of PubkeyAcceptedAlgorithms
  and HostbasedAcceptedAlgorithms with regard to ECDSA keys
  Resolves: RHEL-166221
- CVE-2026-35414: Fix mishandling of authorized_keys principals option
  Resolves: RHEL-166189
- CVE-2026-35386: Add validation rules to usernames and hostnames
  set for ProxyJump/-J on the commandline
  Resolves: RHEL-166205




More information about the El-errata mailing list