openssh-clients vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the openssh-clients package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Race Condition

<0:8.7p1-38.el9_4.1
  • H
Race Condition

<0:8.7p1-38.el9_4.1
  • H
Race Condition

<0:8.7p1-38.el9_4.1
  • H
Race Condition

<0:8.7p1-38.el9_4.1
  • M
Improper Neutralization of Null Byte or NUL Character

*
  • M
Failure to Sanitize Special Element

*
  • M
Race Condition

<0:8.7p1-38.el9_4.4
  • M
Race Condition

<0:8.7p1-38.el9_4.4
  • H
Arbitrary Code Injection

<0:8.7p1-30.el9_2
  • M
Race Condition

<0:8.7p1-38.el9_4.4
  • M
Race Condition

<0:8.7p1-38.el9_4.4
  • H
Arbitrary Code Injection

<0:8.7p1-30.el9_2
  • H
Arbitrary Code Injection

<0:8.7p1-30.el9_2
  • M
Memory Leak

<0:8.7p1-29.el9_2
  • M
OS Command Injection

<0:8.7p1-34.el9_3.3
  • M
Truncation of Security-relevant Information

<0:8.7p1-34.el9_3.3
  • M
OS Command Injection

<0:8.7p1-34.el9_3.3
  • M
Truncation of Security-relevant Information

<0:8.7p1-34.el9_3.3
  • M
OS Command Injection

<0:8.7p1-34.el9_3.3
  • M
Truncation of Security-relevant Information

<0:8.7p1-34.el9_3.3
  • M
Memory Leak

<0:8.7p1-29.el9_2
  • M
Memory Leak

<0:8.7p1-29.el9_2
  • M
OS Command Injection

<0:8.7p1-34.el9_3.3
  • M
Truncation of Security-relevant Information

<0:8.7p1-34.el9_3.3
  • H
Arbitrary Code Injection

<0:8.7p1-30.el9_2
  • H
Arbitrary Code Injection

<0:8.7p1-30.el9_2
  • H
Arbitrary Code Injection

<0:8.7p1-30.el9_2
  • H
Arbitrary Code Injection

<0:8.7p1-30.el9_2
  • M
Memory Leak

<0:8.7p1-29.el9_2
  • M
Memory Leak

<0:8.7p1-29.el9_2
  • M
Memory Leak

<0:8.7p1-29.el9_2
  • M
Memory Leak

<0:8.7p1-29.el9_2
  • M
Detection of Error Condition Without Action

<0:8.7p1-45.el9
  • M
Detection of Error Condition Without Action

<0:8.7p1-45.el9
  • M
Detection of Error Condition Without Action

<0:8.7p1-45.el9
  • M
Detection of Error Condition Without Action

<0:8.7p1-45.el9
  • M
Race Condition

<0:8.7p1-38.el9_4.4
  • M
Race Condition

<0:8.7p1-38.el9_4.4
  • M
Race Condition

<0:8.7p1-38.el9_4.4
  • H
Race Condition

<0:8.7p1-38.el9_4.1
  • H
Race Condition

<0:8.7p1-38.el9_4.1
  • H
Race Condition

<0:8.7p1-38.el9_4.1
  • M
Detection of Error Condition Without Action

<0:8.7p1-45.el9
  • M
Detection of Error Condition Without Action

<0:8.7p1-38.el9_4.5
  • M
Detection of Error Condition Without Action

<0:8.7p1-38.el9_4.5
  • M
Detection of Error Condition Without Action

<0:8.7p1-38.el9_4.5
  • M
Expected Behavior Violation

*
  • M
OS Command Injection

<0:8.7p1-34.el9_3.3
  • M
Truncation of Security-relevant Information

<0:8.7p1-34.el9_3.3
  • M
OS Command Injection

<0:8.7p1-34.el9_3.3
  • M
Truncation of Security-relevant Information

<0:8.7p1-34.el9_3.3
  • M
OS Command Injection

<0:8.7p1-34.el9_3.3
  • M
Truncation of Security-relevant Information

<0:8.7p1-34.el9_3.3
  • M
Detection of Error Condition Without Action

<0:8.7p1-45.el9
  • H
Race Condition

<0:8.7p1-38.el9_4.1
  • M
Race Condition

<0:8.7p1-38.el9_4.4
  • M
OS Command Injection

<0:8.7p1-34.el9_3.3
  • M
Truncation of Security-relevant Information

<0:8.7p1-34.el9_3.3
  • H
Arbitrary Code Injection

<0:8.7p1-30.el9_2
  • M
Memory Leak

<0:8.7p1-29.el9_2
  • M
Race Condition

<0:8.7p1-12.el9_0.3
  • M
Race Condition

<0:8.7p1-30.el9_2.7
  • M
Race Condition

<0:8.7p1-30.el9_2.7
  • M
Race Condition

<0:8.7p1-30.el9_2.7
  • M
Race Condition

<0:8.7p1-38.el9_4.4
  • H
Race Condition

<0:8.7p1-12.el9_0.1
  • H
Race Condition

<0:8.7p1-30.el9_2.4
  • H
Race Condition

<0:8.7p1-30.el9_2.4
  • H
Race Condition

<0:8.7p1-30.el9_2.4
  • H
Race Condition

<0:8.7p1-38.el9_4.1
  • M
OS Command Injection

<0:8.7p1-30.el9_2.3
  • M
Truncation of Security-relevant Information

<0:8.7p1-30.el9_2.3
  • M
OS Command Injection

<0:8.7p1-30.el9_2.3
  • M
Truncation of Security-relevant Information

<0:8.7p1-30.el9_2.3
  • M
OS Command Injection

<0:8.7p1-30.el9_2.3
  • M
Truncation of Security-relevant Information

<0:8.7p1-30.el9_2.3
  • M
Improper Authentication

*
  • M
OS Command Injection

<0:8.7p1-34.el9_3.3
  • M
Truncation of Security-relevant Information

<0:8.7p1-34.el9_3.3
  • H
Arbitrary Code Injection

<0:8.7p1-11.el9_0
  • H
Arbitrary Code Injection

<0:8.7p1-30.el9_2
  • H
Arbitrary Code Injection

<0:8.7p1-30.el9_2
  • H
Arbitrary Code Injection

<0:8.7p1-30.el9_2
  • H
Arbitrary Code Injection

<0:8.7p1-11.el9_0
  • H
Arbitrary Code Injection

<0:8.7p1-30.el9_2
  • M
Memory Leak

<0:8.7p1-29.el9_2
  • M
Memory Leak

<0:8.7p1-29.el9_2
  • M
Memory Leak

<0:8.7p1-29.el9_2
  • M
Memory Leak

<0:8.7p1-29.el9_2