Vulnerability Report

Name:
linuxserver/openssh-server:amd64-latest@sha256:9913176ba4b1a1fcd12951293e56ee29254821575036bfcdf9881cee5b34778b
Type:
image
Checksum:
sha256:1b87e8e8bd58165f18f8a3f073499361eaf53861ed456aa84b2abbd088fcf05f
Date:
2026-01-07T04:59:22.168006067Z
Grype Logo
Critical
0
High
4
Medium
17
Low
18
Unknown
0
Name Version Type Vulnerability Severity Risk State Fixed In Description Related URLs PURL
coreutils 9.7-r1 apk CVE-2016-2781 Medium 0.04% N/A chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer. ["http://www.openwall.com/lists/oss-security/2016/02/28/2","http://www.openwall.com/lists/oss-security/2016/02/28/3","https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"] pkg:apk/alpine/coreutils@9.7-r1?arch=x86_64&distro=alpine-3.22.1
coreutils-env 9.7-r1 apk CVE-2016-2781 Medium 0.04% N/A chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer. ["http://www.openwall.com/lists/oss-security/2016/02/28/2","http://www.openwall.com/lists/oss-security/2016/02/28/3","https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"] pkg:apk/alpine/coreutils-env@9.7-r1?arch=x86_64&distro=alpine-3.22.1&upstream=coreutils
coreutils-fmt 9.7-r1 apk CVE-2016-2781 Medium 0.04% N/A chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer. ["http://www.openwall.com/lists/oss-security/2016/02/28/2","http://www.openwall.com/lists/oss-security/2016/02/28/3","https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"] pkg:apk/alpine/coreutils-fmt@9.7-r1?arch=x86_64&distro=alpine-3.22.1&upstream=coreutils
coreutils-sha512sum 9.7-r1 apk CVE-2016-2781 Medium 0.04% N/A chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer. ["http://www.openwall.com/lists/oss-security/2016/02/28/2","http://www.openwall.com/lists/oss-security/2016/02/28/3","https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"] pkg:apk/alpine/coreutils-sha512sum@9.7-r1?arch=x86_64&distro=alpine-3.22.1&upstream=coreutils
curl 8.14.1-r1 apk CVE-2025-10148 Medium 0.04% fixed
  • 8.14.1-r2
[] pkg:apk/alpine/curl@8.14.1-r1?arch=x86_64&distro=alpine-3.22.1
libcurl 8.14.1-r1 apk CVE-2025-10148 Medium 0.04% fixed
  • 8.14.1-r2
[] pkg:apk/alpine/libcurl@8.14.1-r1?arch=x86_64&distro=alpine-3.22.1&upstream=curl
jq 1.8.0-r0 apk CVE-2025-49014 Medium 0.03% fixed
  • 1.8.1-r0
[] pkg:apk/alpine/jq@1.8.0-r0?arch=x86_64&distro=alpine-3.22.1
busybox 1.37.0-r19 apk CVE-2025-60876 Medium 0.03% N/A BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20). ["https://gist.github.com/subyumatest/41554af6a72aedaacaec026adc311092","https://lists.busybox.net/pipermail/busybox/attachments/20250823/ccdc96ef/attachment-0001.htm","https://lists.busybox.net/pipermail/busybox/attachments/20250828/e7f90492/attachment.htm"] pkg:apk/alpine/busybox@1.37.0-r19?arch=x86_64&distro=alpine-3.22.1
busybox-binsh 1.37.0-r19 apk CVE-2025-60876 Medium 0.03% N/A BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20). ["https://gist.github.com/subyumatest/41554af6a72aedaacaec026adc311092","https://lists.busybox.net/pipermail/busybox/attachments/20250823/ccdc96ef/attachment-0001.htm","https://lists.busybox.net/pipermail/busybox/attachments/20250828/e7f90492/attachment.htm"] pkg:apk/alpine/busybox-binsh@1.37.0-r19?arch=x86_64&distro=alpine-3.22.1&upstream=busybox
ssl_client 1.37.0-r19 apk CVE-2025-60876 Medium 0.03% N/A BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20). ["https://gist.github.com/subyumatest/41554af6a72aedaacaec026adc311092","https://lists.busybox.net/pipermail/busybox/attachments/20250823/ccdc96ef/attachment-0001.htm","https://lists.busybox.net/pipermail/busybox/attachments/20250828/e7f90492/attachment.htm"] pkg:apk/alpine/ssl_client@1.37.0-r19?arch=x86_64&distro=alpine-3.22.1&upstream=busybox
c-ares 1.34.5-r0 apk CVE-2025-62408 Medium 0.03% fixed
  • 1.34.6-r0
[] pkg:apk/alpine/c-ares@1.34.5-r0?arch=x86_64&distro=alpine-3.22.1
curl 8.14.1-r1 apk CVE-2025-9086 High 0.02% fixed
  • 8.14.1-r2
[] pkg:apk/alpine/curl@8.14.1-r1?arch=x86_64&distro=alpine-3.22.1
libcurl 8.14.1-r1 apk CVE-2025-9086 High 0.02% fixed
  • 8.14.1-r2
[] pkg:apk/alpine/libcurl@8.14.1-r1?arch=x86_64&distro=alpine-3.22.1&upstream=curl
libcrypto3 3.5.3-r1 apk CVE-2025-9230 High 0.02% fixed
  • 3.5.4-r0
[] pkg:apk/alpine/libcrypto3@3.5.3-r1?arch=x86_64&distro=alpine-3.22.1&upstream=openssl
libssl3 3.5.3-r1 apk CVE-2025-9230 High 0.02% fixed
  • 3.5.4-r0
[] pkg:apk/alpine/libssl3@3.5.3-r1?arch=x86_64&distro=alpine-3.22.1&upstream=openssl
libcrypto3 3.5.3-r1 apk CVE-2025-9232 Medium 0.02% fixed
  • 3.5.4-r0
[] pkg:apk/alpine/libcrypto3@3.5.3-r1?arch=x86_64&distro=alpine-3.22.1&upstream=openssl
libssl3 3.5.3-r1 apk CVE-2025-9232 Medium 0.02% fixed
  • 3.5.4-r0
[] pkg:apk/alpine/libssl3@3.5.3-r1?arch=x86_64&distro=alpine-3.22.1&upstream=openssl
linux-pam 1.7.0-r4 apk CVE-2024-10041 Medium 0.02% N/A A vulnerability was found in PAM. The secret information is stored in memory, where the attacker can trigger the victim program to execute by sending characters to its standard input (stdin). As this occurs, the attacker can train the branch predictor to execute an ROP chain speculatively. This flaw could result in leaked passwords, such as those found in /etc/shadow while performing authentications. ["https://access.redhat.com/errata/RHSA-2024:10379","https://access.redhat.com/errata/RHSA-2024:11250","https://access.redhat.com/errata/RHSA-2024:9941","https://access.redhat.com/security/cve/CVE-2024-10041","https://bugzilla.redhat.com/show_bug.cgi?id=2319212"] pkg:apk/alpine/linux-pam@1.7.0-r4?arch=x86_64&distro=alpine-3.22.1
libcrypto3 3.5.3-r1 apk CVE-2025-9231 Medium 0.01% fixed
  • 3.5.4-r0
[] pkg:apk/alpine/libcrypto3@3.5.3-r1?arch=x86_64&distro=alpine-3.22.1&upstream=openssl
libssl3 3.5.3-r1 apk CVE-2025-9231 Medium 0.01% fixed
  • 3.5.4-r0
[] pkg:apk/alpine/libssl3@3.5.3-r1?arch=x86_64&distro=alpine-3.22.1&upstream=openssl
curl 8.14.1-r1 apk CVE-2025-10966 Medium 0.01% unknown N/A curl's code for managing SSH connections when SFTP was done using the wolfSSH powered backend was flawed and missed host verification mechanisms. This prevents curl from detecting MITM attackers and more. ["https://curl.se/docs/CVE-2025-10966.html","https://curl.se/docs/CVE-2025-10966.json","https://hackerone.com/reports/3355218","http://www.openwall.com/lists/oss-security/2025/11/05/2"] pkg:apk/alpine/curl@8.14.1-r1?arch=x86_64&distro=alpine-3.22.1
busybox 1.37.0-r19 apk CVE-2024-58251 Low 0.01% fixed
  • 1.37.0-r20
[] pkg:apk/alpine/busybox@1.37.0-r19?arch=x86_64&distro=alpine-3.22.1
busybox-binsh 1.37.0-r19 apk CVE-2024-58251 Low 0.01% fixed
  • 1.37.0-r20
[] pkg:apk/alpine/busybox-binsh@1.37.0-r19?arch=x86_64&distro=alpine-3.22.1&upstream=busybox
ssl_client 1.37.0-r19 apk CVE-2024-58251 Low 0.01% fixed
  • 1.37.0-r20
[] pkg:apk/alpine/ssl_client@1.37.0-r19?arch=x86_64&distro=alpine-3.22.1&upstream=busybox
busybox 1.37.0-r19 apk CVE-2025-46394 Low 0.01% fixed
  • 1.37.0-r20
[] pkg:apk/alpine/busybox@1.37.0-r19?arch=x86_64&distro=alpine-3.22.1
busybox-binsh 1.37.0-r19 apk CVE-2025-46394 Low 0.01% fixed
  • 1.37.0-r20
[] pkg:apk/alpine/busybox-binsh@1.37.0-r19?arch=x86_64&distro=alpine-3.22.1&upstream=busybox
ssl_client 1.37.0-r19 apk CVE-2025-46394 Low 0.01% fixed
  • 1.37.0-r20
[] pkg:apk/alpine/ssl_client@1.37.0-r19?arch=x86_64&distro=alpine-3.22.1&upstream=busybox
openssh-client-common 10.0_p1-r9 apk CVE-2025-61985 Low 0.00% fixed
  • 10.0_p1-r10
[] pkg:apk/alpine/openssh-client-common@10.0_p1-r9?arch=x86_64&distro=alpine-3.22.1&upstream=openssh
openssh-client-default 10.0_p1-r9 apk CVE-2025-61985 Low 0.00% fixed
  • 10.0_p1-r10
[] pkg:apk/alpine/openssh-client-default@10.0_p1-r9?arch=x86_64&distro=alpine-3.22.1&upstream=openssh
openssh-keygen 10.0_p1-r9 apk CVE-2025-61985 Low 0.00% fixed
  • 10.0_p1-r10
[] pkg:apk/alpine/openssh-keygen@10.0_p1-r9?arch=x86_64&distro=alpine-3.22.1&upstream=openssh
openssh-server-common 10.0_p1-r9 apk CVE-2025-61985 Low 0.00% fixed
  • 10.0_p1-r10
[] pkg:apk/alpine/openssh-server-common@10.0_p1-r9?arch=x86_64&distro=alpine-3.22.1&upstream=openssh
openssh-server-pam 10.0_p1-r9 apk CVE-2025-61985 Low 0.00% fixed
  • 10.0_p1-r10
[] pkg:apk/alpine/openssh-server-pam@10.0_p1-r9?arch=x86_64&distro=alpine-3.22.1&upstream=openssh
openssh-sftp-server 10.0_p1-r9 apk CVE-2025-61985 Low 0.00% fixed
  • 10.0_p1-r10
[] pkg:apk/alpine/openssh-sftp-server@10.0_p1-r9?arch=x86_64&distro=alpine-3.22.1&upstream=openssh
openssh-client-common 10.0_p1-r9 apk CVE-2025-61984 Low 0.00% fixed
  • 10.0_p1-r10
[] pkg:apk/alpine/openssh-client-common@10.0_p1-r9?arch=x86_64&distro=alpine-3.22.1&upstream=openssh
openssh-client-default 10.0_p1-r9 apk CVE-2025-61984 Low 0.00% fixed
  • 10.0_p1-r10
[] pkg:apk/alpine/openssh-client-default@10.0_p1-r9?arch=x86_64&distro=alpine-3.22.1&upstream=openssh
openssh-keygen 10.0_p1-r9 apk CVE-2025-61984 Low 0.00% fixed
  • 10.0_p1-r10
[] pkg:apk/alpine/openssh-keygen@10.0_p1-r9?arch=x86_64&distro=alpine-3.22.1&upstream=openssh
openssh-server-common 10.0_p1-r9 apk CVE-2025-61984 Low 0.00% fixed
  • 10.0_p1-r10
[] pkg:apk/alpine/openssh-server-common@10.0_p1-r9?arch=x86_64&distro=alpine-3.22.1&upstream=openssh
openssh-server-pam 10.0_p1-r9 apk CVE-2025-61984 Low 0.00% fixed
  • 10.0_p1-r10
[] pkg:apk/alpine/openssh-server-pam@10.0_p1-r9?arch=x86_64&distro=alpine-3.22.1&upstream=openssh
openssh-sftp-server 10.0_p1-r9 apk CVE-2025-61984 Low 0.00% fixed
  • 10.0_p1-r10
[] pkg:apk/alpine/openssh-sftp-server@10.0_p1-r9?arch=x86_64&distro=alpine-3.22.1&upstream=openssh