<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for openssh is now available for openEuler-24.03-LTS-SP1,openEuler-24.03-LTS-SP2,openEuler-24.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-1963</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-04-17</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-04-17</InitialReleaseDate>
		<CurrentReleaseDate>2026-04-17</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-04-17</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">openssh security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for openssh is now available for openEuler-24.03-LTS-SP1,openEuler-24.03-LTS-SP2,openEuler-24.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">An open source implementation of SSH protocol version 2

Security Fix(es):

Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.(CVE-2026-3497)

In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users&apos; expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).(CVE-2026-35385)

In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.(CVE-2026-35386)

OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.(CVE-2026-35387)

OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.(CVE-2026-35388)

OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.(CVE-2026-35414)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for openssh is now available for openEuler-24.03-LTS-SP1,openEuler-24.03-LTS-SP2,openEuler-24.03-LTS-SP3,openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">openssh</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1963</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-3497</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-35385</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-35386</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-35387</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-35388</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-35414</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-3497</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-35385</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-35386</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-35387</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-35388</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-35414</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openEuler-24.03-LTS-SP1</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS-SP2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openEuler-24.03-LTS-SP2</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openEuler-24.03-LTS-SP3</FullProductName>
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="openssh-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-9.6p1-13.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-askpass-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-askpass-9.6p1-13.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-clients-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-clients-9.6p1-13.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debuginfo-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-debuginfo-9.6p1-13.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debugsource-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-debugsource-9.6p1-13.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-keycat-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-keycat-9.6p1-13.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-server-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-server-9.6p1-13.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="pam_ssh_agent_auth-0.10.4-5.13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">pam_ssh_agent_auth-0.10.4-5.13.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-9.6p1-13.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-askpass-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-askpass-9.6p1-13.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-clients-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-clients-9.6p1-13.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debuginfo-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-debuginfo-9.6p1-13.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debugsource-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-debugsource-9.6p1-13.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-keycat-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-keycat-9.6p1-13.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-server-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-server-9.6p1-13.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="pam_ssh_agent_auth-0.10.4-5.13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">pam_ssh_agent_auth-0.10.4-5.13.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-9.6p1-13.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-askpass-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-askpass-9.6p1-13.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-clients-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-clients-9.6p1-13.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debuginfo-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-debuginfo-9.6p1-13.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debugsource-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-debugsource-9.6p1-13.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-keycat-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-keycat-9.6p1-13.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-server-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-server-9.6p1-13.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="pam_ssh_agent_auth-0.10.4-5.13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">pam_ssh_agent_auth-0.10.4-5.13.oe2403sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-8.2p1-35.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-askpass-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-askpass-8.2p1-35.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-cavs-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-cavs-8.2p1-35.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-clients-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-clients-8.2p1-35.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debuginfo-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-debuginfo-8.2p1-35.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debugsource-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-debugsource-8.2p1-35.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-keycat-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-keycat-8.2p1-35.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-ldap-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-ldap-8.2p1-35.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-server-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-server-8.2p1-35.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="pam_ssh_agent_auth-0.10.3-9.35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">pam_ssh_agent_auth-0.10.3-9.35.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-8.8p1-41.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-askpass-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-askpass-8.8p1-41.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-clients-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-clients-8.8p1-41.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debuginfo-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-debuginfo-8.8p1-41.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debugsource-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-debugsource-8.8p1-41.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-keycat-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-keycat-8.8p1-41.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-server-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-server-8.8p1-41.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="pam_ssh_agent_auth-0.10.4-4.41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">pam_ssh_agent_auth-0.10.4-4.41.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-9.3p2-11.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-askpass-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-askpass-9.3p2-11.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-clients-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-clients-9.3p2-11.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debuginfo-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-debuginfo-9.3p2-11.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debugsource-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-debugsource-9.3p2-11.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-keycat-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-keycat-9.3p2-11.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssh-server-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-server-9.3p2-11.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="pam_ssh_agent_auth-0.10.4-4.11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">pam_ssh_agent_auth-0.10.4-4.11.oe2403.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="openssh-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-9.6p1-13.oe2403sp1.src.rpm</FullProductName>
			<FullProductName ProductID="openssh-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-9.6p1-13.oe2403sp2.src.rpm</FullProductName>
			<FullProductName ProductID="openssh-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-9.6p1-13.oe2403sp3.src.rpm</FullProductName>
			<FullProductName ProductID="openssh-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-8.2p1-35.oe2003sp4.src.rpm</FullProductName>
			<FullProductName ProductID="openssh-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-8.8p1-41.oe2203sp4.src.rpm</FullProductName>
			<FullProductName ProductID="openssh-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-9.3p2-11.oe2403.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="openssh-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-9.6p1-13.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-askpass-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-askpass-9.6p1-13.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-clients-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-clients-9.6p1-13.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debuginfo-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-debuginfo-9.6p1-13.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debugsource-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-debugsource-9.6p1-13.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-keycat-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-keycat-9.6p1-13.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-server-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-server-9.6p1-13.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="pam_ssh_agent_auth-0.10.4-5.13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">pam_ssh_agent_auth-0.10.4-5.13.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-9.6p1-13.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-askpass-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-askpass-9.6p1-13.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-clients-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-clients-9.6p1-13.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debuginfo-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-debuginfo-9.6p1-13.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debugsource-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-debugsource-9.6p1-13.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-keycat-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-keycat-9.6p1-13.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-server-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-server-9.6p1-13.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="pam_ssh_agent_auth-0.10.4-5.13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">pam_ssh_agent_auth-0.10.4-5.13.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-9.6p1-13.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-askpass-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-askpass-9.6p1-13.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-clients-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-clients-9.6p1-13.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debuginfo-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-debuginfo-9.6p1-13.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debugsource-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-debugsource-9.6p1-13.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-keycat-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-keycat-9.6p1-13.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-server-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-server-9.6p1-13.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="pam_ssh_agent_auth-0.10.4-5.13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">pam_ssh_agent_auth-0.10.4-5.13.oe2403sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-8.2p1-35.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-askpass-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-askpass-8.2p1-35.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-cavs-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-cavs-8.2p1-35.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-clients-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-clients-8.2p1-35.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debuginfo-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-debuginfo-8.2p1-35.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debugsource-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-debugsource-8.2p1-35.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-keycat-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-keycat-8.2p1-35.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-ldap-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-ldap-8.2p1-35.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-server-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-server-8.2p1-35.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="pam_ssh_agent_auth-0.10.3-9.35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">pam_ssh_agent_auth-0.10.3-9.35.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-8.8p1-41.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-askpass-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-askpass-8.8p1-41.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-clients-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-clients-8.8p1-41.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debuginfo-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-debuginfo-8.8p1-41.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debugsource-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-debugsource-8.8p1-41.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-keycat-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-keycat-8.8p1-41.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-server-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-server-8.8p1-41.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="pam_ssh_agent_auth-0.10.4-4.41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">pam_ssh_agent_auth-0.10.4-4.41.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-9.3p2-11.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-askpass-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-askpass-9.3p2-11.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-clients-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-clients-9.3p2-11.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debuginfo-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-debuginfo-9.3p2-11.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-debugsource-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-debugsource-9.3p2-11.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-keycat-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-keycat-9.3p2-11.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssh-server-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-server-9.3p2-11.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="pam_ssh_agent_auth-0.10.4-4.11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">pam_ssh_agent_auth-0.10.4-4.11.oe2403.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="openssh-help-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openssh-help-9.6p1-13.oe2403sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="openssh-help-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openssh-help-9.6p1-13.oe2403sp2.noarch.rpm</FullProductName>
			<FullProductName ProductID="openssh-help-9.6p1-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP3">openssh-help-9.6p1-13.oe2403sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="openssh-help-8.2p1-35" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openssh-help-8.2p1-35.oe2003sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="openssh-help-8.8p1-41" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openssh-help-8.8p1-41.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="openssh-help-9.3p2-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssh-help-9.3p2-11.oe2403.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.</Note>
		</Notes>
		<ReleaseDate>2026-04-17</ReleaseDate>
		<CVE>CVE-2026-3497</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.9</BaseScore>
				<Vector>AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>openssh security update</Description>
				<DATE>2026-04-17</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1963</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users&apos; expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).</Note>
		</Notes>
		<ReleaseDate>2026-04-17</ReleaseDate>
		<CVE>CVE-2026-35385</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>openssh security update</Description>
				<DATE>2026-04-17</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1963</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.</Note>
		</Notes>
		<ReleaseDate>2026-04-17</ReleaseDate>
		<CVE>CVE-2026-35386</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>3.6</BaseScore>
				<Vector>AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>openssh security update</Description>
				<DATE>2026-04-17</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1963</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.</Note>
		</Notes>
		<ReleaseDate>2026-04-17</ReleaseDate>
		<CVE>CVE-2026-35387</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>3.1</BaseScore>
				<Vector>AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>openssh security update</Description>
				<DATE>2026-04-17</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1963</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.</Note>
		</Notes>
		<ReleaseDate>2026-04-17</ReleaseDate>
		<CVE>CVE-2026-35388</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Low</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>2.5</BaseScore>
				<Vector>AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>openssh security update</Description>
				<DATE>2026-04-17</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1963</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.</Note>
		</Notes>
		<ReleaseDate>2026-04-17</ReleaseDate>
		<CVE>CVE-2026-35414</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
				<ProductID>openEuler-24.03-LTS-SP3</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.1</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>openssh security update</Description>
				<DATE>2026-04-17</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1963</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>