CVE-2026-3497
Publication date 12 March 2026
Last updated 12 March 2026
Ubuntu priority
Description
OpenSSH GSSAPI Key Exchange Pre-Authentication Uninitialized Pointer Dereference, Heap Corruption, and Privsep Boundary Violation
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| openssh | 25.10 questing |
Fixed 1:10.0p1-5ubuntu5.1
|
| 24.04 LTS noble |
Fixed 1:9.6p1-3ubuntu13.15
|
|
| 22.04 LTS jammy |
Fixed 1:8.9p1-3ubuntu0.14
|
|
| 20.04 LTS focal |
Fixed 1:8.2p1-4ubuntu0.13+esm1
|
|
| 18.04 LTS bionic |
Not affected
|
|
| 16.04 LTS xenial |
Not affected
|
|
| 14.04 LTS trusty |
Not affected
|
|
| openssh-ssh1 | 25.10 questing | Ignored |
| 24.04 LTS noble | Ignored | |
| 22.04 LTS jammy | Ignored | |
| 20.04 LTS focal | Ignored | |
| 18.04 LTS bionic | Ignored |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu Pro 30-day free trialNotes
mdeslaur
openssh-ssh1 is only provided for compatibility with old devices that cannot be upgraded to modern protocols. We will not be providing any security support for the openssh-ssh1 package as it is insecure and should be used in trusted environments only.
ej7367
bionic and older are not affected because they use packet_disconnect() (which then calls the correct ssh_packet_disconnect() function).
References
Related Ubuntu Security Notices (USN)
- USN-8090-1
- OpenSSH vulnerabilities
- 12 March 2026
- USN-8090-2
- OpenSSH vulnerabilities
- 12 March 2026