Back

OpenSSH 10.3 Addresses Critical Shell Injection and Security Issues

Severity: High (Score: 72.0)

Sources: Cybersecuritynews, Gbhackers, Feeds2.Feedburner

Summary

OpenSSH released version 10.3 and its portable version 10.3p1 on April 2, 2026, which includes critical security fixes for multiple vulnerabilities, notably a shell injection flaw affecting the -J (ProxyJump) option. This vulnerability could allow attackers to execute arbitrary commands on the system. The update also removes legacy rekeying support, which may impact interoperability with older SSH implementations. System administrators are urged to review the changes and apply the update promptly to mitigate risks. The release follows a testing phase that began in late March 2026. OpenSSH is widely used, making this update essential for many organizations. The project has not specified any CVEs in the articles, but the shell injection flaw is highlighted as particularly dangerous. Users of non-standard or legacy SSH software should verify compatibility before upgrading. Key Points: • OpenSSH 10.3 fixes a critical shell injection vulnerability in the -J option. • Legacy rekeying support has been removed, affecting older SSH implementations. • System administrators are urged to upgrade to mitigate potential exploitation risks.

Key Entities

  • OpenSSH (platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed