[CLSA-2026:1777567965] openssh: Fix of CVE-2026-35385
Type:
security
Severity:
Important
Release date:
2026-04-30 16:52:49 UTC
Description:
- CVE-2026-35385: when downloading files as root in legacy (-O) mode and without the -p (preserve modes) flag, scp(1) did not clear setuid/setgid bits from downloaded files. Backport upstream commit 487e8ac1 to mask out the setuid/setgid bits in this case
Updated packages:
  • openssh-8.0p1-6.el8_4.2.tuxcare.els11.x86_64.rpm
    sha:84f6f167e90be06488a05dd59433667dc39fba705e338302bd40d59a2d8a6e38
  • openssh-askpass-8.0p1-6.el8_4.2.tuxcare.els11.x86_64.rpm
    sha:187488d3352fad5d9b830c429332e2ecb8366e9c81d8a3726904d36c0a9e9b1c
  • openssh-cavs-8.0p1-6.el8_4.2.tuxcare.els11.x86_64.rpm
    sha:4fa6cf73a8085ce667c12238b01901f9097a91b1b50e0c473c7b2db0c0889728
  • openssh-clients-8.0p1-6.el8_4.2.tuxcare.els11.x86_64.rpm
    sha:e8be9037d41a0655ec949f0739e1bf406d7c869386d203710147e74127afa06e
  • openssh-keycat-8.0p1-6.el8_4.2.tuxcare.els11.x86_64.rpm
    sha:4a2a9e99e2ccf9ba1c583ea69db572be99925d6a7d5542648c0d29292004f0df
  • openssh-ldap-8.0p1-6.el8_4.2.tuxcare.els11.x86_64.rpm
    sha:0a516584156cde4d6f1e4ab74eeaa15f13b397ec0a6245fd8479884de248eb16
  • openssh-server-8.0p1-6.el8_4.2.tuxcare.els11.x86_64.rpm
    sha:41387f8480f95b82ede3147df1c91686cb48982309a96310cf6ac8569f728408
  • pam_ssh_agent_auth-0.10.3-7.6.el8_4.1.tuxcare.els11.x86_64.rpm
    sha:5df8065e4f4bf7829a1ede73e31478292fafa2c2b087032d81f12d645f02fca9
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.