Openssh Openssh

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Openssh.

By the Year

In 2026 there have been 0 vulnerabilities in Openssh. Openssh did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 2 6.50

It may take a day or so for new Openssh vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Openssh Security Vulnerabilities

OpenSSH <10.0 RowHammer Auth Bypass via mm_answer_authpassword
CVE-2023-51767 - December 24, 2023

OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges. NOTE: this is disputed by the Supplier, who states "we do not consider it to be the application's responsibility to defend against platform architectural weaknesses."

OpenSSH 9.1 Double-Free RCE via kex_algorithms (sshd)
CVE-2023-25136 6.5 - Medium - February 03, 2023

OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."

Double-free

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Openssh or by Openssh? Click the Watch button to subscribe.

Openssh
Vendor

Openssh
Product

subscribe