Search for packages
| purl | pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7 |
| Next non-vulnerable version | 1:9.2p1-2+deb12u8 |
| Latest non-vulnerable version | 1:10.3p1-1 |
| Risk | 3.7 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-792n-jkzj-qqhd
Aliases: CVE-2026-35385 |
In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode). |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-8efr-budq-6bb6
Aliases: CVE-2026-35414 |
OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-a4eq-r71a-buhm
Aliases: CVE-2026-35386 |
In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-a7m6-uqbt-nqd9
Aliases: CVE-2025-61985 |
openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand |
Affected by 0 other vulnerabilities. |
|
VCID-ajmg-5kgx-k7h5
Aliases: CVE-2026-3497 |
openssh: OpenSSH GSSAPI: Information disclosure or denial of service due to uninitialized variables |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-bnrq-2fsr-mfgd
Aliases: CVE-2026-35388 |
OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-kgn5-p8kx-qucj
Aliases: CVE-2026-35387 |
OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-wga4-sqwk-4bfj
Aliases: CVE-2025-61984 |
openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-a7m6-uqbt-nqd9 | openssh: OpenSSH: Null character in ssh:// URI can lead to code execution via ProxyCommand |
CVE-2025-61985
|
| VCID-ajmg-5kgx-k7h5 | openssh: OpenSSH GSSAPI: Information disclosure or denial of service due to uninitialized variables |
CVE-2026-3497
|
| VCID-b4uc-yh56-muej | openssh: possible bypass of fido 2 devices and ssh-askpass |
CVE-2021-36368
|
| VCID-ha8v-pqwf-r3a1 | Multiple vulnerabilities have been found in OpenSSH, the worst of which could allow a remote attacker to gain unauthorized access. |
CVE-2025-26465
|
| VCID-hse5-y15y-n3dw | openssh: OpenSSH SSHD Agent Forwarding and X11 Forwarding |
CVE-2025-32728
|
| VCID-wga4-sqwk-4bfj | openssh: OpenSSH: Control characters in usernames can lead to code execution via ProxyCommand |
CVE-2025-61984
|