Versions Packages Information History CVEs Related Badges Report

Versions for openssh

595 package(s) known

Repository Package name Version Category Maintainer(s)
Adélie Linux current
system
openssh-keysign 8.1_p1 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
openssh-sftp-server 8.1_p1 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
openssh-openrc 8.1_p1 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
openssh-client 8.1_p1 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
openssh-keygen 8.1_p1 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
openssh-dbg 8.1_p1 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
openssh-doc 8.1_p1 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
openssh-server 8.1_p1 Potentially vulnerable - horst@adelielinux.org
Adélie Linux current
system
openssh 8.1_p1 Potentially vulnerable - horst@adelielinux.org
AIX Toolbox openssh 3.6.1p2 Potentially vulnerable Shell/Security -
AlmaLinux 8
BaseOS
openssh 8.0p1 Potentially vulnerable Applications/Internet packager@almalinux.org
AlmaLinux 9
BaseOS
openssh 8.7p1 Potentially vulnerable Unspecified packager@almalinux.org
AlmaLinux 9
BaseOS
openssh 8.7p1 Potentially vulnerable Unspecified packager@almalinux.org
Alpine Linux 3.8
main
openssh-client 7.7_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
openssh-doc 7.7_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
openssh-server-pam 7.7_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
openssh-keysign 7.7_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
openssh-keygen 7.7_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
openssh-server 7.7_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
openssh 7.7_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
openssh-sftp-server 7.7_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.8
main
openssh-server-common 7.7_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
openssh-keysign 7.9_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
openssh 7.9_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
openssh-keygen 7.9_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
openssh-client 7.9_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
openssh-server-common 7.9_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
openssh-server 7.9_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
openssh-server-pam 7.9_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
openssh-doc 7.9_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.9
main
openssh-sftp-server 7.9_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
openssh 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
openssh-doc 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
openssh-server-pam 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
openssh-keygen 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
openssh-keysign 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
openssh-client 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
openssh-dbg 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
openssh-sftp-server 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
openssh-server-common 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.10
main
openssh-server 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
openssh-server-pam 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
openssh-doc 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
openssh-client 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
openssh-server-common 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
openssh-keygen 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
openssh 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
openssh-sftp-server 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
openssh-keysign 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
openssh-server 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.11
main
openssh-dbg 8.1_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
openssh-sftp-server 8.3_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
openssh 8.3_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
openssh-client 8.3_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
openssh-keygen 8.3_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
openssh-server-pam 8.3_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
openssh-doc 8.3_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
openssh-dbg 8.3_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
openssh-keysign 8.3_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
openssh-server 8.3_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.12
main
openssh-server-common 8.3_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
openssh-server 8.4_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
openssh-keygen 8.4_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
openssh 8.4_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
openssh-dbg 8.4_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
openssh-server-pam 8.4_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
openssh-server-common 8.4_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
openssh-keysign 8.4_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
openssh-client 8.4_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
openssh-sftp-server 8.4_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.13
main
openssh-doc 8.4_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
openssh-server-common 8.6_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
openssh-doc 8.6_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
openssh-client-krb5 8.6_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
openssh-keygen 8.6_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
openssh-client-common 8.6_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
openssh-server-pam 8.6_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
openssh-keysign 8.6_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
openssh-client-default 8.6_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
openssh 8.6_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
openssh-sftp-server 8.6_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
openssh-server 8.6_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
openssh-server-krb5 8.6_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.14
main
openssh-dbg 8.6_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
openssh 8.8_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
openssh-server 8.8_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
openssh-keysign 8.8_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
openssh-keygen 8.8_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
openssh-server-pam 8.8_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
openssh-server-common 8.8_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
openssh-client-common 8.8_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
openssh-client-default 8.8_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
openssh-client-krb5 8.8_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
openssh-server-krb5 8.8_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
openssh-sftp-server 8.8_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
openssh-dbg 8.8_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.15
main
openssh-doc 8.8_p1 Potentially vulnerable - ncopa@alpinelinux.org
Alpine Linux 3.16
main
openssh-dbg 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
openssh-keygen 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
openssh-server-krb5 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
openssh-doc 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
openssh-server-pam 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
openssh-keysign 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
openssh-server 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
openssh-client-default 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
openssh 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
openssh-sftp-server 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
openssh-sk-helper 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
openssh-server-common 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
openssh-client-common 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux 3.16
main
openssh-client-krb5 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
openssh-sftp-server 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
openssh-client-default 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
openssh-client-krb5 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
openssh-client-common 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
openssh-server-pam 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
openssh-keygen 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
openssh-server 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
openssh-dbg 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
openssh-doc 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
openssh-sk-helper 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
openssh-keysign 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
openssh 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
openssh-server-common 9.0_p1 - ncopa@alpinelinux.org
Alpine Linux Edge
main
openssh-server-krb5 9.0_p1 - ncopa@alpinelinux.org
ALT Linux p9 openssh 7.9p1 Potentially vulnerable Networking/Remote access glebfm@altlinux.org
ALT Linux p10 openssh 7.9p1 Potentially vulnerable Networking/Remote access glebfm@altlinux.org
ALT Sisyphus openssh 8.6p1 Potentially vulnerable Networking/Remote access glebfm@altlinux.org
Amazon Linux 1
updates
openssh 7.4p1 Potentially vulnerable Applications/Internet -
Amazon Linux 1
updates
openssh 7.4p1 Potentially vulnerable Applications/Internet -
Amazon Linux 1
updates
openssh 7.4p1 Potentially vulnerable Applications/Internet -
Amazon Linux 1
main
openssh 7.4p1 Potentially vulnerable Applications/Internet -
Amazon Linux 1
updates
openssh 7.4p1 Potentially vulnerable Applications/Internet -
Amazon Linux 1
updates
openssh 7.4p1 Potentially vulnerable Applications/Internet -
Amazon Linux 2 openssh 7.4p1 Potentially vulnerable Applications/Internet -
Amazon Linux 2 openssh 7.4p1 Potentially vulnerable Applications/Internet -
Amazon Linux 2 openssh 7.4p1 Potentially vulnerable Applications/Internet -
Amazon Linux 2 openssh 7.4p1 Potentially vulnerable Applications/Internet -
Amazon Linux 2 openssh 7.4p1 Potentially vulnerable Applications/Internet -
Amazon Linux 2 openssh 7.4p1 Potentially vulnerable Applications/Internet -
Amazon Linux 2 openssh 7.4p1 Potentially vulnerable Applications/Internet -
antiX-17
nosystemd
openssh 7.6p1 Potentially vulnerable nosystemd debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
antiX-19
dev
openssh 7.9p1 Potentially vulnerable dev debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
antiX-19
nosystemd
openssh 7.9p1 Potentially vulnerable nosystemd debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
antiX-21
dev
openssh 8.4p1 Potentially vulnerable dev debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
antiX-21
nosystemd
openssh 8.4p1 Potentially vulnerable nosystemd debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
AOSC openssh 8.8p1 Potentially vulnerable net fallback-mnt-aosc@repology
Apertis v2020
v2020/target
openssh 7.9p1 Potentially vulnerable main debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Apertis v2021
v2021/target
openssh 7.9p1 Potentially vulnerable main debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Apertis v2022
v2022/target
openssh 8.4p1 Potentially vulnerable main debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Apertis v2023 Development
v2023dev1/target
openssh 8.4p1 Potentially vulnerable main debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
AppGet OpenSSH 8.3.1.1 Potentially vulnerable - -
Arch
core
openssh 9.0p1 - -
Arch Linux 32 i486
core
openssh 8.7p1 Potentially vulnerable - -
Arch Linux 32 i686
core
openssh 8.7p1 Potentially vulnerable - -
Arch Linux 32 pentium4
core
openssh 8.7p1 Potentially vulnerable - -
Arch Linux ARM aarch64
core
openssh 9.0p1 - -
Arch Linux ARM aarch64
core
openssh-debug 9.0p1 - -
Arch Linux ARM armv7h
core
openssh-debug 9.0p1 - -
Arch Linux ARM armv7h
core
openssh 9.0p1 - -
ArchPOWER powerpc openssh 9.0p1 - -
ArchPOWER powerpc openssh-debug 9.0p1 - -
ArchPOWER powerpc64le openssh 9.0p1 - -
ArchPOWER powerpc64le openssh-debug 9.0p1 - -
ArchPOWER riscv64 openssh 9.0p1 - -
ArchPOWER riscv64 openssh-debug 9.0p1 - -
AUR openssh-git 7.9.P1.r242.gf5abb05f - eworm@aur
AUR openssh-selinux 9.0p1 - ioonag@aur
AUR openssh-gssapi 8.4p1 Potentially vulnerable - christoph.gysin@aur
Artix
system
openssh 9.0p1 - -
Ataraxia GNU/Linux openssh 8.6p1 Potentially vulnerable net nagakamira@gmail.com
Carbs Linux
extra
openssh 9.0p1 - cem@carbslinux.org
CentOS 6
os
openssh 5.3p1 Potentially vulnerable Applications/Internet -
CentOS 6
updates
openssh 5.3p1 Potentially vulnerable Applications/Internet -
CentOS 7
os
openssh 7.4p1 Potentially vulnerable Applications/Internet -
CentOS 7
updates
openssh 7.4p1 Potentially vulnerable Applications/Internet -
CentOS 8
BaseOS
openssh 8.0p1 Potentially vulnerable Applications/Internet bugs@centos.org
CentOS Stream 8
BaseOS
openssh 8.0p1 Potentially vulnerable Applications/Internet bugs@centos.org
CentOS Stream 8
BaseOS
openssh 8.0p1 Potentially vulnerable Applications/Internet bugs@centos.org
CentOS Stream 8
BaseOS
openssh 8.0p1 Potentially vulnerable Applications/Internet bugs@centos.org
CentOS Stream 8
BaseOS
openssh 8.0p1 Potentially vulnerable Applications/Internet bugs@centos.org
CentOS Stream 8
BaseOS
openssh 8.0p1 Potentially vulnerable Applications/Internet bugs@centos.org
CentOS Stream 8
BaseOS
openssh 8.0p1 Potentially vulnerable Applications/Internet bugs@centos.org
CentOS Stream 9
BaseOS
openssh 8.7p1 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
openssh 8.7p1 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
openssh 8.7p1 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
openssh 8.7p1 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
openssh 8.7p1 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
openssh 8.7p1 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
openssh 8.7p1 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
openssh 8.7p1 Potentially vulnerable Unspecified builder@centos.org
CentOS Stream 9
BaseOS
openssh 8.6p1 Potentially vulnerable Unspecified builder@centos.org
Chocolatey ssh-copy-id (Install) 0.1p0 Potentially vulnerable - -
CRUX 3.4
core
openssh 8.0p1 Potentially vulnerable - core-ports@crux.nu
CRUX 3.5
core
openssh 8.4p1 Potentially vulnerable - core-ports@crux.nu
CRUX 3.6
core
openssh 9.0p1 - core-ports@crux.nu
Cygwin openssh 9.0p1 Net corinna.vinschen@cygwin
Cygwin openssh-debuginfo 9.0p1 Debug corinna.vinschen@cygwin
Debian 8
jessie/main
openssh 6.7p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Debian 8
jessie/updates/main
openssh 6.7p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Debian 9
stretch/updates/main
openssh 7.4p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Debian 9
stretch/main
openssh 7.4p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Debian 10
buster/updates/main
openssh 7.9p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Debian 10
buster/main
openssh 7.9p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Debian 10
buster/main
openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Debian 10 Backports
buster-backports/main
openssh 8.4p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Debian 11
bullseye/main
openssh 8.4p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Debian 11
bullseye/main
openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Debian 12
bookworm/main
openssh 9.0p1 net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Debian 12
bookworm/main
openssh 8.4p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Debian 12
bookworm/main
openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Debian Unstable
sid/main
openssh 9.0p1 net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Debian Unstable
sid/main
openssh 8.4p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Debian Unstable
sid/main
openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Deepin
main
openssh 7.9p1.6 Potentially vulnerable - debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Deepin
main
openssh 7.9p1 Potentially vulnerable - debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Deepin
main
openssh-ssh1 7.5p1 Potentially vulnerable - debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Devuan 1.0
jessie/main
openssh 6.7p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Devuan 2.0
ascii/main
openssh 7.4p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Devuan 3.0
beowulf/main
openssh 7.9p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Devuan 3.0
beowulf/main
openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Devuan 4.0
chimaera/main
openssh 8.4p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Devuan 4.0
chimaera/main
openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Devuan Unstable
unstable/main
openssh 9.0p1 net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Devuan Unstable
unstable/main
openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
distri openssh 8.2p1 Potentially vulnerable - -
DistroWatch.com openssh 9.0p1 - -
DPorts security/openssh-portable 9.0.p1 security bdrewery@freebsd.org
Endless OS 4.0
core
openssh 8.4p1 Potentially vulnerable main debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Endless OS master
core
openssh 8.4p1 Potentially vulnerable main debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Entware
mipssf-k3.4
openssh-sftp-server 9.0p1 net tripolar@gmx.at
Entware
mipssf-k3.4
openssh-sftp-client 9.0p1 net tripolar@gmx.at
Entware
mipselsf-k3.4
openssh-client 9.0p1 net tripolar@gmx.at
Entware
mipselsf-k3.4
openssh-client-utils 9.0p1 net tripolar@gmx.at
Entware
mipselsf-k3.4
openssh-keygen 9.0p1 net tripolar@gmx.at
Entware
mipselsf-k3.4
openssh-moduli 9.0p1 net tripolar@gmx.at
Entware
mipselsf-k3.4
openssh-server 9.0p1 net tripolar@gmx.at
Entware
mipselsf-k3.4
openssh-server-pam 9.0p1 net tripolar@gmx.at
Entware
mipselsf-k3.4
openssh-sftp-client 9.0p1 net tripolar@gmx.at
Entware
mipselsf-k3.4
openssh-sftp-server 9.0p1 net tripolar@gmx.at
Entware
mipssf-k3.4
openssh-client 9.0p1 net tripolar@gmx.at
Entware
mipssf-k3.4
openssh-client-utils 9.0p1 net tripolar@gmx.at
Entware
mipssf-k3.4
openssh-keygen 9.0p1 net tripolar@gmx.at
Entware
mipssf-k3.4
openssh-moduli 9.0p1 net tripolar@gmx.at
Entware
mipssf-k3.4
openssh-server 9.0p1 net tripolar@gmx.at
Entware
mipssf-k3.4
openssh-server-pam 9.0p1 net tripolar@gmx.at
Entware
x64-k3.2
openssh-client 9.0p1 net tripolar@gmx.at
Entware
x64-k3.2
openssh-client-utils 9.0p1 net tripolar@gmx.at
Entware
x64-k3.2
openssh-keygen 9.0p1 net tripolar@gmx.at
Entware
x64-k3.2
openssh-moduli 9.0p1 net tripolar@gmx.at
Entware
x64-k3.2
openssh-server 9.0p1 net tripolar@gmx.at
Entware
x64-k3.2
openssh-server-pam 9.0p1 net tripolar@gmx.at
Entware
x64-k3.2
openssh-sftp-client 9.0p1 net tripolar@gmx.at
Entware
x64-k3.2
openssh-sftp-server 9.0p1 net tripolar@gmx.at
Entware
aarch64-k3.10
openssh-client 9.0p1 net tripolar@gmx.at
Entware
aarch64-k3.10
openssh-client-utils 9.0p1 net tripolar@gmx.at
Entware
aarch64-k3.10
openssh-keygen 9.0p1 net tripolar@gmx.at
Entware
aarch64-k3.10
openssh-moduli 9.0p1 net tripolar@gmx.at
Entware
aarch64-k3.10
openssh-server 9.0p1 net tripolar@gmx.at
Entware
aarch64-k3.10
openssh-server-pam 9.0p1 net tripolar@gmx.at
Entware
aarch64-k3.10
openssh-sftp-client 9.0p1 net tripolar@gmx.at
Entware
aarch64-k3.10
openssh-sftp-server 9.0p1 net tripolar@gmx.at
Entware
armv5sf-k3.2
openssh-client 9.0p1 net tripolar@gmx.at
Entware
armv5sf-k3.2
openssh-client-utils 9.0p1 net tripolar@gmx.at
Entware
armv5sf-k3.2
openssh-keygen 9.0p1 net tripolar@gmx.at
Entware
armv5sf-k3.2
openssh-moduli 9.0p1 net tripolar@gmx.at
Entware
armv5sf-k3.2
openssh-server 9.0p1 net tripolar@gmx.at
Entware
armv5sf-k3.2
openssh-server-pam 9.0p1 net tripolar@gmx.at
Entware
armv5sf-k3.2
openssh-sftp-client 9.0p1 net tripolar@gmx.at
Entware
armv5sf-k3.2
openssh-sftp-server 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k2.6
openssh-client 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k2.6
openssh-client-utils 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k2.6
openssh-keygen 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k2.6
openssh-moduli 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k2.6
openssh-server 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k2.6
openssh-server-pam 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k2.6
openssh-sftp-client 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k2.6
openssh-sftp-server 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k3.2
openssh-client 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k3.2
openssh-client-utils 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k3.2
openssh-keygen 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k3.2
openssh-moduli 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k3.2
openssh-server 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k3.2
openssh-server-pam 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k3.2
openssh-sftp-client 9.0p1 net tripolar@gmx.at
Entware
armv7sf-k3.2
openssh-sftp-server 9.0p1 net tripolar@gmx.at
EPEL 6 gsi-openssh 5.3p1 Potentially vulnerable Applications/Internet -
EPEL 7 gsi-openssh 7.4p1 Potentially vulnerable Applications/Internet -
EPEL 8 gsi-openssh 8.0p1 Potentially vulnerable Applications/Internet -
EPEL 9 gsi-openssh 8.7p1 Potentially vulnerable Unspecified -
EuroLinux 8
baseos
openssh 8.0p1 Potentially vulnerable Applications/Internet -
EuroLinux 8
baseos
openssh 8.0p1 Potentially vulnerable Applications/Internet -
EuroLinux 8
baseos
openssh 8.0p1 Potentially vulnerable Applications/Internet -
EuroLinux 8
baseos
openssh 8.0p1 Potentially vulnerable Applications/Internet -
Exherbo
arbor
net-misc/openssh 9.0_p1 net-misc fallback-mnt-exherbo@repology
Exherbo
arbor
net-misc/openssh 8.7_p1 Potentially vulnerable net-misc fallback-mnt-exherbo@repology
Fedora 26
release
gsi-openssh 7.5p1 Potentially vulnerable Applications/Internet -
Fedora 26
release
openssh 7.5p1 Potentially vulnerable Applications/Internet -
Fedora 26
updates
gsi-openssh 7.5p1 Potentially vulnerable Applications/Internet -
Fedora 26
updates
openssh 7.5p1 Potentially vulnerable Applications/Internet -
Fedora 27
updates
gsi-openssh 7.6p1 Potentially vulnerable Applications/Internet -
Fedora 27
updates
openssh 7.6p1 Potentially vulnerable Applications/Internet -
Fedora 27
release
gsi-openssh 7.5p1 Potentially vulnerable Applications/Internet -
Fedora 27
release
openssh 7.5p1 Potentially vulnerable Applications/Internet -
Fedora 28
updates
gsi-openssh 7.8p1 Potentially vulnerable Applications/Internet -
Fedora 28
updates
openssh 7.8p1 Potentially vulnerable Applications/Internet -
Fedora 28
release
openssh 7.7p1 Potentially vulnerable Applications/Internet -
Fedora 28
release
gsi-openssh 7.6p1 Potentially vulnerable Applications/Internet -
Fedora 29
updates
gsi-openssh 7.9p1 Potentially vulnerable Unspecified -
Fedora 29
updates
openssh 7.9p1 Potentially vulnerable Unspecified -
Fedora 29
release
openssh 7.8p1 Potentially vulnerable Applications/Internet -
Fedora 29
release
gsi-openssh 7.7p1 Potentially vulnerable Applications/Internet -
Fedora 30
updates
gsi-openssh 8.0p1 Potentially vulnerable Unspecified -
Fedora 30
updates
openssh 8.0p1 Potentially vulnerable Unspecified -
Fedora 30
release
gsi-openssh 7.9p1 Potentially vulnerable Unspecified -
Fedora 30
release
openssh 7.9p1 Potentially vulnerable Unspecified -
Fedora 31
updates
gsi-openssh 8.1p1 Potentially vulnerable Unspecified -
Fedora 31
updates
openssh 8.1p1 Potentially vulnerable Unspecified -
Fedora 31
release
gsi-openssh 8.0p1 Potentially vulnerable Unspecified -
Fedora 31
release
openssh 8.0p1 Potentially vulnerable Unspecified -
Fedora 32
updates
gsi-openssh 8.3p1 Potentially vulnerable Unspecified -
Fedora 32
updates
openssh 8.3p1 Potentially vulnerable Unspecified -
Fedora 32
release
openssh 8.2p1 Potentially vulnerable Unspecified -
Fedora 32
release
gsi-openssh 8.1p1 Potentially vulnerable Unspecified -
Fedora 33
release
openssh 8.4p1 Potentially vulnerable Unspecified -
Fedora 33
updates
gsi-openssh 8.4p1 Potentially vulnerable Unspecified -
Fedora 33
updates
openssh 8.4p1 Potentially vulnerable Unspecified -
Fedora 33
release
gsi-openssh 8.3p1 Potentially vulnerable Unspecified -
Fedora 34
updates
gsi-openssh 8.6p1 Potentially vulnerable Unspecified -
Fedora 34
updates
openssh 8.6p1 Potentially vulnerable Unspecified -
Fedora 34
release
gsi-openssh 8.5p1 Potentially vulnerable Unspecified -
Fedora 34
release
openssh 8.5p1 Potentially vulnerable Unspecified -
Fedora 35
release
openssh 8.7p1 Potentially vulnerable Unspecified -
Fedora 35
updates
gsi-openssh 8.7p1 Potentially vulnerable Unspecified -
Fedora 35
updates
openssh 8.7p1 Potentially vulnerable Unspecified -
Fedora 35
release
gsi-openssh 8.6p1 Potentially vulnerable Unspecified -
Fedora 36
release
gsi-openssh 8.8p1 Potentially vulnerable Unspecified -
Fedora 36
release
openssh 8.8p1 Potentially vulnerable Unspecified -
Fedora 37
development
gsi-openssh 8.8p1 Potentially vulnerable Unspecified -
Fedora 37
development
openssh 8.8p1 Potentially vulnerable Unspecified -
Fedora Rawhide
development
gsi-openssh 9.0p1 Unspecified -
Fedora Rawhide
development
openssh 9.0p1 Unspecified -
FreeBSD Ports security/openssh-portable 9.0.p1 security bdrewery@freebsd.org
freshcode.club openssh 9.0 - -
Funtoo 1.4
core-kit
net-misc/openssh 8.4_p1 Potentially vulnerable net-misc base-system@gentoo.org, robbat2@gentoo.org
Funtoo 1.4
core-kit
net-misc/openssh 8.4_p1 Potentially vulnerable net-misc base-system@gentoo.org, robbat2@gentoo.org
Gentoo net-misc/openssh 9.0_p1 net-misc base-system@gentoo.org
Gentoo net-misc/openssh 9.0_p1 net-misc base-system@gentoo.org
Gentoo net-misc/openssh 9.0_p1 net-misc base-system@gentoo.org
Gentoo net-misc/openssh 8.9_p1 Potentially vulnerable net-misc base-system@gentoo.org
GNU Guix openssh 8.8p1 Potentially vulnerable - -
GoboLinux OpenSSH 8.7p1 Potentially vulnerable - -
HaikuPorts master net-misc/openssh 8.8p1 Potentially vulnerable net-misc -
Homebrew openssh 9.0p1 - -
Homebrew ssh-copy-id 9.0p1 - -
HP-UX 11.31
ia64_64
openssh 9.0p1 - -
HP-UX 11.31
hppa_32
openssh 8.4p1 Potentially vulnerable - -
HP-UX 11.31
ia64_64
openssh 8.4p1 Potentially vulnerable - -
HP-UX 11.31
hppa_32
openssh 7.5p1 Potentially vulnerable - -
HP-UX 11.31
ia64_32
openssh 7.5p1 Potentially vulnerable - -
HP-UX 11.31
ia64_64
openssh 7.5p1 Potentially vulnerable - -
HP-UX 11.31
hppa_32
openssh 6.4p1 Potentially vulnerable - -
IBM i openssh 8.1p1 Potentially vulnerable Unspecified -
just-install openssh 8.7 Potentially vulnerable - -
Kali Linux Rolling
main
openssh 9.0p1 net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Kali Linux Rolling
main
openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
KaOS
core
openssh 9.0p1 - demm@kaosx.us
LiGurOS stable net-misc/openssh 9.0_p1 net-misc dev@liguros.net, base-system@gentoo.org
LiGurOS stable net-misc/openssh 8.9_p1 Potentially vulnerable net-misc dev@liguros.net, base-system@gentoo.org
LiGurOS develop net-misc/openssh 9.0_p1 net-misc dev@liguros.net, base-system@gentoo.org
LiGurOS develop net-misc/openssh 8.9_p1 Potentially vulnerable net-misc dev@liguros.net, base-system@gentoo.org
MacPorts openssh 9.0p1 net nomaintainer@macports.org
MacPorts ssh-copy-id 9.0p1 net l2dy@macports, l2dy@github
Maemo Fremantle openssh 5.1p1 Potentially vulnerable - bartosh@gmail.com, cjwatson@debian.org
Mageia 7
core/release
openssh 8.0p1 Potentially vulnerable Networking/Remote access -
Mageia 7
core/updates
openssh 8.0p1 Potentially vulnerable Networking/Remote access -
Mageia 8
core/release
openssh 8.4p1 Potentially vulnerable Networking/Remote access -
Mageia 8
core/updates
openssh 8.4p1 Potentially vulnerable Networking/Remote access -
Mageia 8
core/updates
openssh 8.4p1 Potentially vulnerable Networking/Remote access -
Mageia Cauldron
core/release
openssh 9.0p1 Networking/Remote access -
Manjaro Stable
core
openssh 9.0p1 - -
Manjaro Testing
core
openssh 9.0p1 - -
Manjaro Unstable
core
openssh 9.0p1 - -
MidnightBSD mports security/openssh-portable 8.9.p1 Potentially vulnerable security -
MSYS2 msys2
x86_64
openssh 8.9p1 Potentially vulnerable net-utils -
MSYS2 msys2
i686
openssh 8.5p1 Potentially vulnerable net-utils -
nixpkgs stable 21.05 openssh 8.6p1 Potentially vulnerable - edolstra+nixpkgs@gmail.com, aneeshusa@gmail.com
nixpkgs stable 21.05 ssh-copy-id 8.6p1 Potentially vulnerable - edolstra+nixpkgs@gmail.com, aneeshusa@gmail.com
nixpkgs stable 21.05 openssh-with-hpn 8.4p1 Potentially vulnerable - edolstra+nixpkgs@gmail.com, aneeshusa@gmail.com
nixpkgs stable 21.11 openssh 8.8p1 Potentially vulnerable - janne@hess.ooo
nixpkgs stable 21.11 ssh-copy-id 8.8p1 Potentially vulnerable - janne@hess.ooo
nixpkgs stable 21.11 openssh-with-hpn 8.4p1 Potentially vulnerable - edolstra+nixpkgs@gmail.com, aneeshusa@gmail.com
nixpkgs stable 22.05 openssh 9.0p1 - janne@hess.ooo
nixpkgs stable 22.05 openssh-with-hpn 9.0p1 - ashish.is@lostca.se
nixpkgs stable 22.05 ssh-copy-id 9.0p1 - janne@hess.ooo
nixpkgs unstable ssh-copy-id 9.0p1 - janne@hess.ooo
nixpkgs unstable openssh 9.0p1 - janne@hess.ooo
nixpkgs unstable openssh-with-hpn 9.0p1 - ashish.is@lostca.se
NOIR Linux Main
extra
openssh 9.0p1 - m_matongo@icloud.com
OpenBSD Ports sysutils/ssh-copy-id 8.8pl1 Potentially vulnerable sysutils ports@jpmens.net
openEuler 20.03
source
openssh 7.8p1 Potentially vulnerable Unspecified -
OpenIndiana packages
hipster
openssh 9.0p1 Applications/Internet -
OpenIndiana packages
hipster
openssh 9.0p1 Applications/Internet -
openmamba
devel
openssh 9.0p1 Network/Security silvan.calarco@mambasoft.it
OpenMandriva 4.0
main/release
openssh 8.0p1 Potentially vulnerable Networking/Remote access bero@lindev.ch
OpenMandriva 4.1
main/release
openssh 8.1p1 Potentially vulnerable Networking/Remote access bero@lindev.ch
OpenMandriva 4.2
main/release
openssh 8.4p1 Potentially vulnerable Networking/Remote access bero@lindev.ch
OpenMandriva Rolling
main/release
openssh 9.0p1 Networking/Remote access tpgxyz@gmail.com
OpenMandriva Cooker
main/release
openssh 9.0p1 Networking/Remote access tpgxyz@gmail.com
OpenPKG openssh 9.0p1 SSH -
openSUSE Leap 42.3
updates/oss
openssh 7.2p2 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 42.3
updates/oss
openssh 7.2p2 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 42.3
updates/oss
openssh 7.2p2 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 42.3
updates/oss
openssh 7.2p2 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 42.3
updates/oss
openssh 7.2p2 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 42.3
updates/oss
openssh 7.2p2 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 42.3
main/oss
openssh 7.2p2 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.0
updates/oss
openssh 7.6p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.0
updates/oss
openssh 7.6p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.0
updates/oss
openssh 7.6p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.0
updates/oss
openssh 7.6p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.0
updates/oss
openssh 7.6p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.0
updates/oss
openssh 7.6p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.0
updates/oss
openssh 7.6p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.0
main/oss
openssh 7.6p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.1
updates/oss
openssh 7.9p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.1
updates/oss
openssh 7.9p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.1
updates/oss
openssh 7.9p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.1
updates/oss
openssh 7.9p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.1
updates/oss
openssh 7.9p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.1
updates/oss
openssh 7.9p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.1
main/oss
openssh 7.9p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.2
main/oss
openssh 8.1p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.2
updates/oss
openssh 8.1p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.2
updates/oss
openssh 8.1p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.2
updates/oss
openssh 8.1p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.2
updates/oss
openssh 8.1p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.2
updates/oss
openssh 8.1p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.2
updates/oss
openssh 8.1p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.3
main/oss
openssh 8.4p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Leap 15.4
main/oss
openssh 8.4p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE Tumbleweed
src-oss
openssh 8.9p1 Potentially vulnerable Productivity/Networking/SSH -
openSUSE network Tumbleweed openssh 8.9p1 Potentially vulnerable Productivity/Networking/SSH -
OpenWrt 17.01 x86_64
packages
openssh-keygen 7.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 17.01 x86_64
packages
openssh-moduli 7.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 17.01 x86_64
packages
openssh-server-pam 7.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 17.01 x86_64
packages
openssh-server 7.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 17.01 x86_64
packages
openssh-client-utils 7.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 17.01 x86_64
packages
openssh-client 7.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 17.01 x86_64
packages
openssh-sftp-avahi-service 7.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 17.01 x86_64
packages
openssh-sftp-client 7.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 17.01 x86_64
packages
openssh-sftp-server 7.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 18.06 x86_64
packages
openssh-client-utils 7.7p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 18.06 x86_64
packages
openssh-client 7.7p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 18.06 x86_64
packages
openssh-keygen 7.7p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 18.06 x86_64
packages
openssh-moduli 7.7p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 18.06 x86_64
packages
openssh-server-pam 7.7p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 18.06 x86_64
packages
openssh-server 7.7p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 18.06 x86_64
packages
openssh-sftp-avahi-service 7.7p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 18.06 x86_64
packages
openssh-sftp-client 7.7p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 18.06 x86_64
packages
openssh-sftp-server 7.7p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 19.07 x86_64
packages
openssh-client-utils 8.0p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 19.07 x86_64
packages
openssh-client 8.0p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 19.07 x86_64
packages
openssh-keygen 8.0p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 19.07 x86_64
packages
openssh-moduli 8.0p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 19.07 x86_64
packages
openssh-server-pam 8.0p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 19.07 x86_64
packages
openssh-server 8.0p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 19.07 x86_64
packages
openssh-sftp-avahi-service 8.0p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 19.07 x86_64
packages
openssh-sftp-client 8.0p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 19.07 x86_64
packages
openssh-sftp-server 8.0p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 21.02 x86_64
packages
openssh-client-utils 8.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 21.02 x86_64
packages
openssh-client 8.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 21.02 x86_64
packages
openssh-keygen 8.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 21.02 x86_64
packages
openssh-moduli 8.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 21.02 x86_64
packages
openssh-server-pam 8.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 21.02 x86_64
packages
openssh-server 8.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 21.02 x86_64
packages
openssh-sftp-avahi-service 8.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 21.02 x86_64
packages
openssh-sftp-client 8.4p1 Potentially vulnerable net tripolar@gmx.at
OpenWrt 21.02 x86_64
packages
openssh-sftp-server 8.4p1 Potentially vulnerable net tripolar@gmx.at
OS4Depot openssh 53.6 network/misc -
Parabola
core
openssh 9.0p1 - -
Parabola
pcr
openssh-knock 7.5p1 Potentially vulnerable - -
Pardus 17
updates/main
openssh 7.4p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Pardus 17
updates/main
openssh 7.4p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Pardus 17
updates/main
openssh 7.4p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Pardus 17
main
openssh 7.4p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Pardus 19
main
openssh 7.9p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Pardus 19
updates/main
openssh 7.9p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Pardus 19
main
openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Pardus 21
main
openssh 8.4p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Pardus 21
main
openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Parrot
parrot/main
openssh 8.4p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Parrot
parrot-updates/main
openssh 8.4p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Parrot
parrot/main
openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Parrot
parrot-updates/main
openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
PCLinuxOS openssh 8.8p1 Potentially vulnerable Networking/Remote access -
Pisi Linux
main
openssh 9.0_p1 app:console admins@pisilinux.org
pkgsrc current security/openssh 9.0p1 security pkgsrc-users@netbsd.org
PLD Linux openssh 9.0p1 - -
PureOS Amber openssh 7.9p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
PureOS Amber openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
PureOS landing openssh 8.4p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
PureOS landing openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Raspbian Oldstable
main
openssh 7.9p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Raspbian Oldstable
main
openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Raspbian Stable
main
openssh 8.4p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Raspbian Stable
main
openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Raspbian Testing
main
openssh 9.0p1 net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Raspbian Testing
main
openssh-ssh1 7.5p1 Potentially vulnerable misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Ravenports openssh 9.0p1 security kraileth@elderlinux.org
Rocky Linux 8
BaseOS
openssh 8.0p1 Potentially vulnerable Applications/Internet infrastructure@rockylinux.org
Rosa 2014.1
main/updates
openssh 7.8p1 Potentially vulnerable - -
Rosa 2014.1
main/release
openssh 6.6p1 Potentially vulnerable - -
Rosa 2016.1
main/updates
openssh 7.9p1 Potentially vulnerable - -
Rosa 2016.1
main/release
openssh 7.3p1 Potentially vulnerable - -
Rosa 2021.1
main/release
openssh 8.8p1 Potentially vulnerable Networking/Remote access alexander@mezon.ru
Rosa Server 6.9
base/release
openssh 5.3p1 Potentially vulnerable Applications/Internet andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
openssh 5.3p1 Potentially vulnerable Applications/Internet andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/release
openssh 5.3p1 Potentially vulnerable Applications/Internet andrew.lukoshko@rosalab.ru
Rosa Server 6.9
base/updates
openssh 5.3p1 Potentially vulnerable Applications/Internet andrew.lukoshko@rosalab.ru
Rosa Server 7.3
base/release
openssh 6.6.1p1 Potentially vulnerable Applications/Internet s.gorshenkov@rosalinux.ru
Rosa Server 7.5
base/release
openssh 7.4p1 Potentially vulnerable Applications/Internet alex2048@mail.ru
Rosa Server 7.5
base/release
openssh 6.6.1p1 Potentially vulnerable Applications/Internet alex2048@mail.ru
Sabayon for-gentoo net-misc/openssh 8.2_p1 Potentially vulnerable net-misc base-system@gentoo.org, robbat2@gentoo.org
Scientific Linux 7.x openssh 7.4p1 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x openssh 7.4p1 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x openssh 7.4p1 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x openssh 7.4p1 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x openssh 7.4p1 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x openssh 7.4p1 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x openssh 6.6.1p1 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x openssh 6.6.1p1 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x openssh 6.6.1p1 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x openssh 6.6.1p1 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x openssh 6.6.1p1 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x openssh 6.6.1p1 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x openssh 6.6.1p1 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x openssh 6.6.1p1 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x openssh 6.4p1 Potentially vulnerable Applications/Internet -
Scientific Linux 7.x openssh 6.4p1 Potentially vulnerable Applications/Internet -
Scoop
main
openssh 8.9.1.0p1 - -
Slackware 14.2
patches
openssh 7.4p1 Potentially vulnerable - volkerdi@slackware.com
Slackware 14.2
slackware
openssh 7.2p2 Potentially vulnerable - volkerdi@slackware.com
Slackware 15.0
slackware
openssh 8.8p1 Potentially vulnerable - volkerdi@slackware.com
Slackware current
slackware
openssh 9.0p1 - volkerdi@slackware.com
Slackware64 14.2
patches
openssh 7.4p1 Potentially vulnerable - volkerdi@slackware.com
Slackware64 14.2
slackware64
openssh 7.2p2 Potentially vulnerable - volkerdi@slackware.com
Slackware64 15.0
slackware64
openssh 8.8p1 Potentially vulnerable - volkerdi@slackware.com
Slackware64 current
slackware64
openssh 9.0p1 - volkerdi@slackware.com
Slackwarearm 14.2
patches
openssh 7.4p1 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 14.2
slackware
openssh 7.2p2 Potentially vulnerable - volkerdi@slackware.com
Slackwarearm 15.0
slackware
openssh 8.8p1 Potentially vulnerable - volkerdi@slackware.com
SliTaz Cooking openssh 9.0p1 security pascal.bellard@slitaz.org
SliTaz Cooking sftp-server 9.0p1 security pascal.bellard@slitaz.org
SliTaz Next openssh 7.6p1 Potentially vulnerable security pascal.bellard@slitaz.org
SliTaz Next openssh-pam 7.6p1 Potentially vulnerable security pascal.bellard@slitaz.org
Solus openssh 8.6_p1 Potentially vulnerable network.clients algent@protonmail.com
Solus openssh-dbginfo 8.6_p1 Potentially vulnerable debug algent@protonmail.com
Solus openssh-server 8.6_p1 Potentially vulnerable network.clients algent@protonmail.com
Spack openssh 9.0p1 - bernhardkaindl@spack
T2 SDE openssh 9.0p1 base/system extra/network rene@t2-project.org
Termux openssh 9.0p1 - termux@github
Trisquel 6.0
toutatis/main
openssh 5.9p1 Potentially vulnerable net trisquel-devel@listas.trisquel.info, cjwatson@debian.org, matthew@debian.org
Trisquel 6.0
toutatis-updates/main
openssh 5.9p1 Potentially vulnerable net cjwatson@ubuntu.com, cjwatson@debian.org, matthew@debian.org
Trisquel 7.0
belenos/main
openssh 6.6p1 Potentially vulnerable net trisquel-devel@listas.trisquel.info, cjwatson@debian.org, matthew@debian.org
Trisquel 7.0
belenos-updates/main
openssh 6.6p1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, cjwatson@debian.org, matthew@debian.org
Trisquel 8.0
flidas-updates/main
openssh 7.2p2 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, cjwatson@debian.org, matthew@debian.org
Trisquel 9.0
etiona/main
openssh 7.6p1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, cjwatson@debian.org, matthew@debian.org
Trisquel 9.0
etiona-updates/main
openssh 7.6p1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, cjwatson@debian.org, matthew@debian.org
Trisquel 9.0
etiona-updates/main
openssh 7.6p1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, cjwatson@debian.org, matthew@debian.org
Trisquel 9.0
etiona/main
openssh-ssh1 7.5p1 Potentially vulnerable universe/misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Trisquel 10.0
nabia-updates/main
openssh 8.2p1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, cjwatson@debian.org, matthew@debian.org
Trisquel 10.0
nabia-updates/main
openssh 8.2p1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, cjwatson@debian.org, matthew@debian.org
Trisquel 10.0
nabia-updates/main
openssh 8.2p1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, cjwatson@debian.org, matthew@debian.org
Trisquel 10.0
nabia/main
openssh 8.2p1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, cjwatson@debian.org, matthew@debian.org
Trisquel 10.0
nabia/main
openssh-ssh1 7.5p1 Potentially vulnerable universe/misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
UBI 8
baseos
openssh 8.0p1 Potentially vulnerable Applications/Internet -
Ubuntu 14.04
trusty-updates/main
openssh 6.6p1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, cjwatson@debian.org, matthew@debian.org
Ubuntu 14.04
trusty/main
openssh 6.6p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Ubuntu 16.04
xenial/main
openssh 7.2p2 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Ubuntu 16.04
xenial-updates/main
openssh 7.2p2 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, cjwatson@debian.org, matthew@debian.org
Ubuntu 18.04
bionic/main
openssh 7.6p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Ubuntu 18.04
bionic-updates/main
openssh 7.6p1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, cjwatson@debian.org, matthew@debian.org
Ubuntu 18.04
bionic/universe
openssh-ssh1 7.5p1 Potentially vulnerable universe/misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Ubuntu 20.04
focal-updates/main
openssh 8.2p1 Potentially vulnerable net ubuntu-devel-discuss@lists.ubuntu.com, cjwatson@debian.org, matthew@debian.org
Ubuntu 20.04
focal/main
openssh 8.2p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Ubuntu 20.04
focal/universe
openssh-ssh1 7.5p1 Potentially vulnerable universe/misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Ubuntu 22.04
jammy/main
openssh 8.9p1 Potentially vulnerable net debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Ubuntu 22.04
jammy/universe
openssh-ssh1 7.5p1 Potentially vulnerable universe/misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Ubuntu 22.10
kinetic/main
openssh 9.0p1 net ubuntu-devel-discuss@lists.ubuntu.com, cjwatson@debian.org, matthew@debian.org
Ubuntu 22.10
kinetic/universe
openssh-ssh1 7.5p1 Potentially vulnerable universe/misc debian-ssh@lists.debian.org, cjwatson@debian.org, matthew@debian.org
Void Linux x86_64
x86_64
openssh 9.0p1 - leah@vuxu.org
Void Linux x86_64
x86_64
openssh-sk-helper 9.0p1 - leah@vuxu.org
Wikidata OpenSSH 9.0 - -
yiffOS Knot openssh 8.9p1 Potentially vulnerable - evie@uwueviee.live