Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
libssh: Remote code execution and data exposure risk
OESA-2026-1558
Summary
A security update is available for the libssh library, which is used by programmers to interact with remote computers securely. If not updated, attackers could potentially execute malicious code or access sensitive information on systems using this library. Update to the latest version to protect against these risks.
What to do
- Update libssh to version 0.10.5-9.oe2403sp1.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | libssh | <= 0.10.5-9.oe2403sp1 | 0.10.5-9.oe2403sp1 |
Original title
libssh security update
Original description
The ssh library was designed to be used by programmers needing a working SSH implementation by the mean of a library. The complete control of the client is made by the programmer. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. With its Secure FTP implementation, you can play with remote files easily, without third-party programs others than libcrypto (from openssl).
Security Fix(es):
(CVE-2026-0964)
(CVE-2026-0965)
(CVE-2026-0966)
(CVE-2026-0967)
(CVE-2026-0968)
Security Fix(es):
(CVE-2026-0964)
(CVE-2026-0965)
(CVE-2026-0966)
(CVE-2026-0967)
(CVE-2026-0968)
- https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA... Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-0964 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-0965 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-0966 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-0967 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-0968 Vendor Advisory
Published: 15 Mar 2026 · Updated: 15 Mar 2026 · First seen: 15 Mar 2026