Description
Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.
Published: 2026-03-12
Score: 2.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure or Denial of Service
Action: Apply Patch
AI Analysis

Impact

The vulnerability arises from uninitialized variables used during the GSSAPI key exchange in the OpenSSH server. When an attacker sends an unexpected GSSAPI message type, the server uses sshpkt_disconnect() which does not terminate the connection. This allows the code to use related connection variables that were never set to NULL, leading to random memory access and undefined behavior. The impact can include accidental disclosure of memory contents or a denial of service if the undefined behavior crashes the process. The weakness corresponds to CWE‑824 and CWE‑908.

Affected Systems

Affected systems are Ubuntu distributions that include the patched OpenSSH GSSAPI implementation. The issue is limited to OpenSSH packages customized by Ubuntu; the upstream OpenSSH project is not affected. No specific affected version numbers are enumerated in the available data, so any Ubuntu OpenSSH release that includes the distribution's GSSAPI patch is potentially vulnerable.

Risk and Exploitability

The vulnerability has a CVSS score of 2.7 and an EPSS score of less than 1 %, and it is not listed as a Known Exploited Vulnerability. Exploitation requires network access to an SSH server and the ability to send crafted GSSAPI messages. It may expose sensitive data or cause a service disruption, especially on systems with weaker compiler hardening. The recommended mitigation is to update to an Ubuntu OpenSSH package that contains the patch or to apply an alternative code change that forces proper process termination on error.

Generated by OpenCVE AI on March 18, 2026 at 13:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Ubuntu OpenSSH package that includes the GSSAPI patch.
  • If an update is not yet available, modify the OpenSSH source to replace sshpkt_disconnect() with ssh_packet_disconnect() to ensure termination of the connection on error.
  • Rebuild the package ensuring compiler hardening flags such as -fstack-protector are enabled to reduce the chance of undefined behavior.
  • Verify that GSSAPI is disabled or restricted in sshd_config when not required, and monitor SSH logs for unexpected disconnect or GSSAPI errors.

Generated by OpenCVE AI on March 18, 2026 at 13:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4535-1 openssh security update
Debian DSA Debian DSA DSA-6204-1 openssh security update
Ubuntu USN Ubuntu USN USN-8090-1 OpenSSH vulnerabilities
Ubuntu USN Ubuntu USN USN-8090-2 OpenSSH vulnerabilities
History

Thu, 16 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
References

Wed, 18 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
References

Wed, 18 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
References

Wed, 18 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
References

Wed, 18 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
References

Mon, 16 Mar 2026 14:30:00 +0000


Fri, 13 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Title openssh: OpenSSH GSSAPI: Information disclosure or denial of service due to uninitialized variables
Weaknesses CWE-824
References
Metrics threat_severity

None

cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H'}

threat_severity

Important


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Ubuntu
Ubuntu openssh
Vendors & Products Ubuntu
Ubuntu openssh

Thu, 12 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
References

Thu, 12 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
References

Thu, 12 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.
Weaknesses CWE-908
References
Metrics cvssV4_0

{'score': 2.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2026-04-16T18:24:30.556Z

Reserved: 2026-03-03T19:33:05.664Z

Link: CVE-2026-3497

cve-icon Vulnrichment

Updated: 2026-04-16T18:24:30.556Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-12T19:16:19.910

Modified: 2026-04-16T19:16:34.113

Link: CVE-2026-3497

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-12T18:27:44Z

Links: CVE-2026-3497 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:55:05Z

Weaknesses