Direct Vulnerabilities

Known vulnerabilities in the openssh package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
OS Command Injection

*
  • H
Improper Preservation of Permissions

*
  • L
Misinterpretation of Input

*
  • L
Missing Authentication for Critical Function

*
  • M
Improper Handling of Inconsistent Special Elements

*
  • M
Improper Neutralization of Null Byte or NUL Character

*
  • M
Failure to Sanitize Special Element

*
  • M
Expected Behavior Violation

*
  • M
Detection of Error Condition Without Action

*
  • M
Improper Authentication

*
  • M
OS Command Injection

*
  • M
Truncation of Security-relevant Information

*
  • M
Improper Check for Dropped Privileges

*
  • L
Information Exposure

<0:5.3p1-124.el6_10
  • M
Access Restriction Bypass

<0:5.3p1-117.el6
  • M
Improper Neutralization of Special Elements

<0:5.3p1-104.el6
  • L
Resource Exhaustion

<0:5.3p1-94.el6
  • M
Covert Timing Channel

<0:5.3p1-123.el6_9
  • M
Incorrect Authorization

<0:5.3p1-122.el6
  • M
Improper Input Validation

<0:5.3p1-84.1.el6
  • M
Improper Access Control

<0:5.3p1-117.el6
  • M
Improper Input Validation

<0:5.3p1-114.el6_7
  • L
Resource Exhaustion

<0:5.3p1-81.el6
  • M
Missing Critical Step in Authentication

<0:5.3p1-114.el6_7
  • M
Use After Free

<0:5.3p1-117.el6
  • M
Incorrect Privilege Assignment

<0:5.3p1-117.el6
  • M
Improper Authentication

<0:5.3p1-104.el6
  • L
User Interface (UI) Misrepresentation of Critical Information

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • L
Improper Input Validation

*
  • M
Untrusted Search Path

*
  • L
Information Exposure

*
  • L
Improper Authentication

*
  • M
Arbitrary Command Injection

*
  • M
Information Exposure

*
  • M
User Interface (UI) Misrepresentation of Critical Information

*
  • L
Credentials Management

*