Release date:
2026-04-29 16:12:09 UTC
Description:
- CVE-2026-35385: scp legacy -O mode privilege escalation via umask bypass
Updated packages:
-
openssh-8.7p1-30.el9_2.tuxcare.els11.x86_64.rpm
sha:529fb56107d2d1b0f6ccb1ded79841e3030124c30d1ea716ceef307bbe16fe9d
-
openssh-askpass-8.7p1-30.el9_2.tuxcare.els11.x86_64.rpm
sha:15482c774f0382c8aae892ee442d6ee2e8de73f0856389f118551ef3435a157e
-
openssh-clients-8.7p1-30.el9_2.tuxcare.els11.x86_64.rpm
sha:f7b748b2b73526cb1a1261290a0a24a62bfb6910cbb60873a041b3554dbd5f4e
-
openssh-keycat-8.7p1-30.el9_2.tuxcare.els11.x86_64.rpm
sha:4e4fda6a55dcf9cc881aaec5eed34af101b72547fe4f22d60cb34fa3998e22c8
-
openssh-server-8.7p1-30.el9_2.tuxcare.els11.x86_64.rpm
sha:935017464b992ae90b8f598bdce9c5a09d6501131d45da21a8845dbb5e21b163
-
openssh-sk-dummy-8.7p1-30.el9_2.tuxcare.els11.x86_64.rpm
sha:f231a3a38783b1e99c3f7a1dcfd7bb0575141aaa0f6f44a43d5ab34230129d99
-
pam_ssh_agent_auth-0.10.4-5.30.el9_2.tuxcare.els11.x86_64.rpm
sha:cf2ef73f6ba942ee4bf60578d23900c39fc47f5598b4903a67bdd49557cb2f06
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.