ELSA-2026-6463

ELSA-2026-6463 - openssh security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2026-04-02

Description


[9.9p1-13.0.1]
- Upstream references found with /usr/bin/ssh [Orabug: 37824421]

[9.9p1-13]
- CVE-2026-3497: Fix information disclosure or denial of service due
to uninitialized variables in gssapi-keyex
Resolves: RHEL-155811


Related CVEs


CVE-2026-3497

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 10 (aarch64) openssh-9.9p1-13.0.1.el10_1.src.rpm5ab3b1cb723983927b966f7c5abe380dd367d5eec192210ec4ee7ae4399a8120-ol10_aarch64_appstream
openssh-9.9p1-13.0.1.el10_1.src.rpm5ab3b1cb723983927b966f7c5abe380dd367d5eec192210ec4ee7ae4399a8120-ol10_aarch64_baseos_latest
openssh-9.9p1-13.0.1.el10_1.src.rpm5ab3b1cb723983927b966f7c5abe380dd367d5eec192210ec4ee7ae4399a8120-ol10_aarch64_u1_baseos_patch
openssh-9.9p1-13.0.1.el10_1.aarch64.rpm02367c7e6859d855d4cf7a2a582556ea12286d86c9ab068137cf1cf7d8f34180-ol10_aarch64_baseos_latest
openssh-9.9p1-13.0.1.el10_1.aarch64.rpm02367c7e6859d855d4cf7a2a582556ea12286d86c9ab068137cf1cf7d8f34180-ol10_aarch64_u1_baseos_patch
openssh-askpass-9.9p1-13.0.1.el10_1.aarch64.rpm5136df4d266628068ccdd82266ee5806c68081b44ab243a018de6173901d157b-ol10_aarch64_appstream
openssh-clients-9.9p1-13.0.1.el10_1.aarch64.rpm72e5be628092404cb7135ad16f7ed18fadbb87b36a5d8c90cece5169a7261207-ol10_aarch64_baseos_latest
openssh-clients-9.9p1-13.0.1.el10_1.aarch64.rpm72e5be628092404cb7135ad16f7ed18fadbb87b36a5d8c90cece5169a7261207-ol10_aarch64_u1_baseos_patch
openssh-keycat-9.9p1-13.0.1.el10_1.aarch64.rpm67ee27aebcdc020f4dd7ada199a57c27fd1b9777b318348c171893455feffa49-ol10_aarch64_baseos_latest
openssh-keycat-9.9p1-13.0.1.el10_1.aarch64.rpm67ee27aebcdc020f4dd7ada199a57c27fd1b9777b318348c171893455feffa49-ol10_aarch64_u1_baseos_patch
openssh-keysign-9.9p1-13.0.1.el10_1.aarch64.rpm2525432d5b8ca0c4bc3d92a87d3beaec20f3aa74f2f7b2c574393cdc4bc0c712-ol10_aarch64_appstream
openssh-server-9.9p1-13.0.1.el10_1.aarch64.rpm0e67cdbdbd123838e793a8de1efaa2d8b221fcd57e58ffc1f8a82e475774943f-ol10_aarch64_baseos_latest
openssh-server-9.9p1-13.0.1.el10_1.aarch64.rpm0e67cdbdbd123838e793a8de1efaa2d8b221fcd57e58ffc1f8a82e475774943f-ol10_aarch64_u1_baseos_patch
Oracle Linux 10 (x86_64) openssh-9.9p1-13.0.1.el10_1.src.rpm5ab3b1cb723983927b966f7c5abe380dd367d5eec192210ec4ee7ae4399a8120-ol10_x86_64_appstream
openssh-9.9p1-13.0.1.el10_1.src.rpm5ab3b1cb723983927b966f7c5abe380dd367d5eec192210ec4ee7ae4399a8120-ol10_x86_64_baseos_latest
openssh-9.9p1-13.0.1.el10_1.src.rpm5ab3b1cb723983927b966f7c5abe380dd367d5eec192210ec4ee7ae4399a8120-ol10_x86_64_u1_baseos_patch
openssh-9.9p1-13.0.1.el10_1.x86_64.rpm5482ad2f3296b02d372e993b59dfbccf56d18c31236f727e10bcc878a52b4f59-ol10_x86_64_baseos_latest
openssh-9.9p1-13.0.1.el10_1.x86_64.rpm5482ad2f3296b02d372e993b59dfbccf56d18c31236f727e10bcc878a52b4f59-ol10_x86_64_u1_baseos_patch
openssh-askpass-9.9p1-13.0.1.el10_1.x86_64.rpm833d0ed819303f8ca4ec38c99a5bc9722890b5ba043280bd8875098fe0b0d62c-ol10_x86_64_appstream
openssh-clients-9.9p1-13.0.1.el10_1.x86_64.rpm8efc5114d1e7d59cac8e4057391c64f8494d9e70acd50a80c887272f1dedf1a7-ol10_x86_64_baseos_latest
openssh-clients-9.9p1-13.0.1.el10_1.x86_64.rpm8efc5114d1e7d59cac8e4057391c64f8494d9e70acd50a80c887272f1dedf1a7-ol10_x86_64_u1_baseos_patch
openssh-keycat-9.9p1-13.0.1.el10_1.x86_64.rpmbbe89d24289a2455ee5b17d03916c46f669f4bcba378ce15bab74849174af274-ol10_x86_64_baseos_latest
openssh-keycat-9.9p1-13.0.1.el10_1.x86_64.rpmbbe89d24289a2455ee5b17d03916c46f669f4bcba378ce15bab74849174af274-ol10_x86_64_u1_baseos_patch
openssh-keysign-9.9p1-13.0.1.el10_1.x86_64.rpm14cbe6734f987c7e582dae654389a4d3041a5267f3a898a73abaa8c5540d5ce1-ol10_x86_64_appstream
openssh-server-9.9p1-13.0.1.el10_1.x86_64.rpm6c2989177ed39731b553742e9c47d7609b56d0f79f07c99559b037167201bc52-ol10_x86_64_baseos_latest
openssh-server-9.9p1-13.0.1.el10_1.x86_64.rpm6c2989177ed39731b553742e9c47d7609b56d0f79f07c99559b037167201bc52-ol10_x86_64_u1_baseos_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete