openssh vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the openssh package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Race Condition

*
  • H
Race Condition

*
  • M
OS Command Injection

<0:8.0p1-19.el8_8.2
  • M
Truncation of Security-relevant Information

<0:8.0p1-19.el8_8.2
  • M
OS Command Injection

<0:8.0p1-19.el8_8.2
  • M
Truncation of Security-relevant Information

<0:8.0p1-19.el8_8.2
  • M
OS Command Injection

<0:8.0p1-19.el8_8.2
  • M
Truncation of Security-relevant Information

<0:8.0p1-19.el8_8.2
  • M
OS Command Injection

<0:8.0p1-19.el8_8.2
  • M
Truncation of Security-relevant Information

<0:8.0p1-19.el8_8.2
  • M
OS Command Injection

<0:8.0p1-15.el8_6.3
  • M
Truncation of Security-relevant Information

<0:8.0p1-15.el8_6.3
  • M
OS Command Injection

<0:8.0p1-15.el8_6.3
  • M
Truncation of Security-relevant Information

<0:8.0p1-15.el8_6.3
  • M
OS Command Injection

<0:8.0p1-15.el8_6.3
  • M
Truncation of Security-relevant Information

<0:8.0p1-15.el8_6.3
  • M
OS Command Injection

<0:8.0p1-15.el8_6.3
  • M
Truncation of Security-relevant Information

<0:8.0p1-15.el8_6.3
  • M
Improper Authentication

*
  • M
OS Command Injection

<0:8.0p1-19.el8_9.2
  • M
Truncation of Security-relevant Information

<0:8.0p1-19.el8_9.2
  • H
Arbitrary Code Injection

<0:8.0p1-19.el8_8
  • H
Arbitrary Code Injection

<0:8.0p1-5.el8_2
  • H
Arbitrary Code Injection

<0:8.0p1-15.el8_6
  • H
Arbitrary Code Injection

<0:8.0p1-19.el8_8
  • H
Arbitrary Code Injection

<0:8.0p1-5.el8_2
  • H
Arbitrary Code Injection

<0:8.0p1-15.el8_6
  • H
Arbitrary Code Injection

<0:8.0p1-7.el8_4
  • H
Arbitrary Code Injection

<0:8.0p1-19.el8_8
  • H
Arbitrary Code Injection

<0:8.0p1-19.el8_8
  • H
Arbitrary Code Injection

<0:8.0p1-15.el8_6
  • H
Arbitrary Code Injection

<0:8.0p1-15.el8_6
  • H
Arbitrary Code Injection

<0:8.0p1-7.el8_4
  • H
Arbitrary Code Injection

<0:8.0p1-7.el8_4
  • H
Arbitrary Code Injection

<0:8.0p1-19.el8_8
  • H
Arbitrary Code Injection

<0:8.0p1-5.el8_2
  • H
Arbitrary Code Injection

<0:8.0p1-5.el8_1.1
  • L
Information Exposure

*
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Arbitrary Command Injection

<0:8.0p1-24.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • L
User Interface (UI) Misrepresentation of Critical Information

*
  • L
Information Exposure

*