[security][HIGH] openssh 9.9p2: 3 CVE require triage #1
Labels
No labels
cve
llm-analysis
needs-triage
security
severity-high
source-nvd
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
rpms/openssh#1
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
CVE triage request / Запрос на разбор CVE
Package / Пакет
openssh9.9p29.9p2-2securitysecurity-critical-security-teamHIGH8.13LLM recommendation / Рекомендация LLM
RU
Обнаружены три кандидата на уязвимости (CVE-2026-35385, CVE-2026-35386, CVE-2026-35414) в пакете openssh версии 9.9p2. Все уязвимости связаны с версиями OpenSSH до 10.3 и имеют высокую степень опасности (CVSS 8.1).
Необходимо провести детальный анализ (triage) для подтверждения применимости уязвимостей к текущей конфигурации НАЙС.ОС. Учитывая критичность пакета и высокий CVSS, рекомендуется запланировать обновление пакета до версии 10.3 или выше, если патч не может быть скомпилирован локально.
Рекомендуемое действие:
needs_triageПодсказка по целевой версии:
10.3Проверки: 1. Проверить текущую версию openssh через rpm -q openssh.
2. Проверить наличие уязвимых сценариев: попытка scp с root и флагом -O без -p.
3. Проверить конфигурацию ssh_config на наличие нестандартных настроек символа %.
4. Проверить использование опции principals в authorized_keys с CA, содержащими запятые.
Риски: Возможность установки файлов с правами setuid/setgid через scp, выполнение команд через метасимволы в имени пользователя и неправильная обработка опции principals в authorized_keys, что может привести к компрометации учетных записей и привилегий.
EN
Three CVE candidates (CVE-2026-35385, CVE-2026-35386, CVE-2026-35414) detected in openssh package version 9.9p2. All vulnerabilities relate to OpenSSH versions prior to 10.3 and carry a high severity rating (CVSS 8.1).
Detailed triage is required to confirm applicability to the current NAYOS configuration. Given the critical nature of the package and high CVSS score, it is recommended to schedule an update to version 10.3 or higher if a local backport is not feasible.
Recommended action:
needs_triageTarget version hint:
10.3Tests: 1. Verify current openssh version via rpm -q openssh.
2. Verify vulnerable scenarios: attempt scp as root with -O flag without -p.
3. Check ssh_config for non-default % character settings.
4. Check authorized_keys principals option usage with CA containing commas.
Risks: Potential installation of files with setuid/setgid permissions via scp, command execution via shell metacharacters in usernames, and mishandling of the principals option in authorized_keys, which could lead to account compromise and privilege escalation.
CVE candidates from NVD/CPE
Descriptions
CVE-2026-35385
In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).
CVE-2026-35386
In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.
CVE-2026-35414
OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.
Maintainer checklist
affected,fixed,not_affected,false_positive,deferred, ornot_in_cloud_image.niceos_cve_triageentry.NICE-SAadvisory if a security update is shipped.Machine metadata