| ≤2.3.0 |
pre-2001 |
Critical CRC32 compensation attack detector buffer overflow (CAN-2001-0144) allowing remote root access.
High Malicious servers could access client X11 display or ssh-agent (CERT VU#363181).
High UseLogin remote arbitrary command execution (CERT VU#40327).
|
SSH-1 protocol deficiencies addressed; RC4 and IDEA removed; unencrypted connection support removed. |
| 2.9.9 |
2001-05-21 |
Medium Source IP access control weakness in SSH protocol v2 public key authentication.
Low X11 forwarding cookie file deletion vulnerability (CERT VU#655259).
|
Source IP ACL fixes; X11 forwarding hardened. |
| 3.0.2 |
2001-11-24 |
Medium Environment variable passing to login(1) via UseLogin (CERT VU#157447). UseLogin disabled by default. |
Environment variable sanitisation. |
| 3.1 |
2002-03-07 |
High Off-by-one error in the channel code. |
Channel code bounds fix. |
| 3.4 |
2002-06-26 |
High Remote challenge vulnerability in pre-authentication code. |
Pre-auth hardening. |
| 3.7.1 / 3.7.1p2 |
2003-09-16 |
High Buffer management bug (CERT CA-2003-24).
High Multiple PAM vulnerabilities in Portable OpenSSH (portable only).
|
Buffer management overhaul; PAM fixes. |
| 4.3 |
2006-02-01 |
CVE-2006-0225 Medium — CVSS 4.6 Shell metacharacter expansion in scp local-local and remote-remote copies enabling command injection. |
scp metacharacter sanitisation. |
| 4.4 |
2006-09-27 |
High Unsafe signal handler vulnerability.
Medium SSH protocol 1 denial-of-service attack.
|
Signal handler safety; SSH-1 DoS mitigation. |
| 4.5 |
2006-11-07 |
Medium Privilege separation monitor weakness allowing spoofing of successful authentication (requires prior compromise of network-facing sshd process). |
Privilege separation monitor hardened. |
| 5.0 |
2008-04-03 |
CVE-2008-1483 High — CVSS 6.9 X11 hijacking attack. |
X11 forwarding socket protection. |
| 5.2 |
2009-02-23 |
Low Plaintext recovery attack against SSH (CPNI-957037). Attack considered infeasible in most circumstances but theoretically valid. |
CBC mode hardening. |
| 5.8 / 5.8p2 |
2011-01-24 |
High Potential private key data leak in legacy certificate handling (5.6–5.7).
Medium Local host key theft via keysign/rand-helper in Portable OpenSSH (pre-5.8p2).
|
Certificate handling hardened; keysign privilege fix. |
| 6.4 |
2013-11-08 |
High GCM rekey memory corruption in versions 6.2 and 6.3. |
GCM rekey fix. |
| 6.5 |
2014-01-30 |
No CVEs. |
Ed25519 public key support introduced — ssh-keygen -t ed25519 generates Ed25519 user and host keys. Shorter keys, faster signatures, and stronger security properties than RSA or ECDSA at equivalent bit lengths. |
| 6.9 |
2015-06-30 |
Medium X11 forwarding race condition allowing non-trusted sessions to be treated as trusted (pre-6.9).
Low Weak TTY device permissions (6.7–6.9).
|
X11 forwarding race fix; TTY permissions tightened. |
| 7.0 |
2015-08-11 |
Medium keyboard-interactive authentication allowed circumvention of MaxAuthTries (pre-7.0). |
MaxAuthTries enforcement. |
| 7.1p2 |
2016-01-14 |
CVE-2016-0777 / CVE-2016-0778 High — CVSS 6.5 / 8.1 Client roaming feature allowed malicious servers to retrieve private key data from clients (affects 5.4–7.1). Mitigation: UseRoaming=no.
|
Roaming feature removed; information disclosure closed. |
| 7.2p2 |
2016-03-09 |
Medium X11 forwarding command injection — authenticated users could inject commands to xauth(1) via unvalidated X11 forwarding requests. |
xauth input sanitisation; X11Forwarding=no default. |
| 7.6 |
2017-10-03 |
Low sftp-server read-only mode allowed creation of zero-length files when invoked with -R flag (affects 5.5–7.5). |
sftp-server read-only enforcement fixed. |
| 8.2 |
2020-02-14 |
Medium ssh-agent double-free memory corruption (affects 8.2–8.4). Mitigated by socket peer identity checking and allocator protections; not considered easily exploitable. |
FIDO/U2F security key support introduced — both ssh-keygen -t ed25519-sk (preferred; Ed25519, supported by all FIDO2 security keys) and ssh-keygen -t ecdsa-sk (ECDSA-P256; included for compatibility with FIDO1-only hardware such as YubiKey 4 and earlier that do not support Ed25519) were added simultaneously. Both generate hardware-backed keys tied to a physical security key (YubiKey, etc.), requiring both the private key file and the physical device for authentication. |
| 8.5 |
2021-03-03 |
Fixes the 8.2–8.4 ssh-agent double-free. |
FIDO resident key support (ssh-keygen -K to download keys stored on the device itself); no-touch-required option for automated FIDO use. |
| 8.8 |
2021-09-26 |
Medium AuthorizedKeysCommand / AuthorizedPrincipalsCommand failed to correctly initialise supplemental groups when executing as non-root, inheriting sshd startup groups (affects 6.2–8.7). |
Supplemental group initialisation fixed; RSA-SHA1 disabled by default. |
| 9.2 |
2023-02-02 |
Medium PermitRemoteOpen ignored its first argument unless it was any or none, causing the permission list to fail open with a single rule (affects 8.7–9.1).
Low DNS name validation bypass with CanonicalizeHostname enabled — attacker with DNS control could inject invalid characters into known_hosts (affects 6.5–9.1).
Low Pre-authentication double-free memory fault in sshd 9.1 (not believed exploitable; sandboxed unprivileged process).
|
PermitRemoteOpen logic fixed; DNS canonicalisation hardened. |
| 9.3 |
2023-03-15 |
Medium ssh-add smartcard destination constraints not communicated to agent when using -h flag — keys added without intended per-hop restrictions (affects 8.9–9.2). |
Smartcard destination constraint propagation fixed. |
| 9.3p2 |
2023-07-19 |
CVE-2023-38408 Critical — CVSS 9.8 Remote code execution via forwarded ssh-agent socket — PKCS#11 provider loading could be abused by a malicious server to execute arbitrary code on the client if specific libraries were present (affects 5.5–9.3p1).
|
PKCS#11 provider allowlist enforced; remote loading of arbitrary modules disabled. |
| 9.5 |
2023-10-04 |
No CVEs. General bug fixes including scp directory symlink handling. |
ObscureKeystrokeTiming feature introduced; connection multiplexing improvements. |
| 9.6 |
2023-12-18 |
Medium — CVSS 5.9 Terrapin Attack — protocol weakness allowing an on-path attacker to delete consecutive messages at the start of an encrypted channel, breaking keystroke timing obfuscation and other integrity properties (pre-9.6 with CBC/ChaCha20).
Medium ssh-agent smartcard constraint bypass — when loading multiple keys from a PKCS#11 token, per-key use constraints were only applied to the first key (affects 8.9–9.5).
High Command injection via shell metacharacters — user/hostname arguments were not sanitised before use in ProxyCommand and Match exec directives, enabling injection if a user could be tricked into connecting to a crafted host.
|
Strict key exchange mode (strict-kex) to harden against Terrapin-class attacks; PKCS#11 constraint fix; hostname sanitisation. |
| 9.7 |
2024-03-11 |
No CVEs. Primarily bug fixes. |
DSA deprecation warning added; preparatory work for DSA removal. |
| 9.8 |
2024-07-01 |
Critical — CVSS 8.1 Race condition in sshd — signal handler race condition (affects 8.5p1–9.7p1) could allow unauthenticated remote code execution as root. Exploitation demonstrated on 32-bit Linux/glibc with ASLR, requiring ~6–8 hours of continuous connections.
Low ObscureKeystrokeTiming logic error — the keystroke timing obfuscation feature (9.5–9.7) sent both real and fake packets unconditionally, making it completely ineffective against passive traffic analysis.
|
sshd split into listener and per-session binaries to reduce attack surface; PerSourcePenalties rate-limits repeatedly failing source addresses; DSA disabled at compile time. |
| 9.9 |
2024-09-19 |
No CVEs. |
ML-KEM768x25519-sha256 hybrid post-quantum KEX introduced; private keys now prevented from appearing in core dumps (OpenBSD, Linux, FreeBSD); DSA removal planned for early 2025. |
| 9.9p2 |
2025-02-18 |
CVE-2025-26465 Medium Logic error in VerifyHostKeyDNS — on-path attacker could impersonate any SSH server when the option is enabled (affects 6.8p1–9.9p1).
CVE-2025-26466 Medium Pre-authentication memory/CPU denial-of-service via SSH2_MSG_PING packet handling in sshd (affects 9.5p1–9.9p1). Mitigatable via PerSourcePenalties.
|
Both CVEs fixed; PerSourcePenalties recommended as defence-in-depth against the DoS vector. |
| 10.0 |
2025-04-09 |
Medium DisableForwarding bypass — directive failed to disable X11 and agent forwarding in certain configurations (affects 7.4–9.9).
|
mlkem768x25519-sha256 made default KEX; DSA removed entirely; finite-field Diffie-Hellman disabled in sshd by default; sshd authentication split into separate sshd-auth binary for reduced privilege exposure. |
| 10.1 |
2025-10-06 |
High Shell injection via username — control characters in usernames passed on the command-line were not rejected, allowing injection through %r expansion in ProxyCommand configurations.
|
WarnWeakCrypto option for per-host post-quantum warnings; ssh-agent sockets moved from /tmp to ~/.ssh/agent; DSCP EF marking for interactive sessions. |
| 10.2 |
2025-10-10 |
No CVEs. Regression fix release. |
Fixed critical ControlPersist terminal handling regression that rendered ssh unusable; restored PKCS#11 key downloads; fixed CA signing with ssh-agent-held keys. |
| 10.3 |
2026-04-02 |
High Shell metacharacter validation too late — Match exec blocks in ssh_config validated user input after %-token expansion, enabling potential command injection in affected configurations.
High ProxyJump/-J injection — hostnames and usernames passed via ProxyJump or -J were not validated for shell metacharacters.
Medium scp setuid/setgid not cleared — legacy mode scp downloads as root did not clear setuid/setgid bits on downloaded files.
Medium PubkeyAcceptedAlgorithms ECDSA bypass — ECDSA algorithm restrictions in PubkeyAcceptedAlgorithms and HostbasedAcceptedAlgorithms were not fully enforced.
Medium authorized_keys principals matching error — comma-separated principals in certificates were matched incorrectly, potentially permitting unintended access.
|
Empty certificate principals section no longer treated as wildcard; rekeying compatibility with non-compliant implementations removed; FIDO/WebAuthn certificate signing completed; multiple file support for RevokedHostKeys/RevokedKeys. |