CVE-2026-3497

Publication date 12 March 2026

Last updated 12 March 2026


Ubuntu priority

Description

OpenSSH GSSAPI Key Exchange Pre-Authentication Uninitialized Pointer Dereference, Heap Corruption, and Privsep Boundary Violation

Read the notes from the security team

Status

Package Ubuntu Release Status
openssh 25.10 questing
Fixed 1:10.0p1-5ubuntu5.1
24.04 LTS noble
Fixed 1:9.6p1-3ubuntu13.15
22.04 LTS jammy
Fixed 1:8.9p1-3ubuntu0.14
20.04 LTS focal
Fixed 1:8.2p1-4ubuntu0.13+esm1
18.04 LTS bionic
Not affected
16.04 LTS xenial
Not affected
14.04 LTS trusty
Not affected
openssh-ssh1 25.10 questing Ignored
24.04 LTS noble Ignored
22.04 LTS jammy Ignored
20.04 LTS focal Ignored
18.04 LTS bionic Ignored

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro 30-day free trial

Notes


mdeslaur

openssh-ssh1 is only provided for compatibility with old devices that cannot be upgraded to modern protocols. We will not be providing any security support for the openssh-ssh1 package as it is insecure and should be used in trusted environments only.


ej7367

bionic and older are not affected because they use packet_disconnect() (which then calls the correct ssh_packet_disconnect() function).

References

Related Ubuntu Security Notices (USN)

Other references


Access our resources on patching vulnerabilities