Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
libssh: Malicious Code Execution Through Remote Library
OESA-2026-1563
Summary
A security update is available for libssh, a library used by some programs to connect to remote servers. If not updated, attackers could potentially trick a program that uses libssh into running malicious code, giving them unauthorized access to the system. To stay secure, update your libssh library to the latest version.
What to do
- Update libssh to version 0.10.5-9.oe2403.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | libssh | <= 0.10.5-9.oe2403 | 0.10.5-9.oe2403 |
Original title
libssh security update
Original description
The ssh library was designed to be used by programmers needing a working SSH implementation by the mean of a library. The complete control of the client is made by the programmer. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. With its Secure FTP implementation, you can play with remote files easily, without third-party programs others than libcrypto (from openssl).
Security Fix(es):
(CVE-2026-0965)
(CVE-2026-0966)
(CVE-2026-0968)
Security Fix(es):
(CVE-2026-0965)
(CVE-2026-0966)
(CVE-2026-0968)
- https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA... Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-0965 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-0966 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-0968 Vendor Advisory
Published: 15 Mar 2026 · Updated: 15 Mar 2026 · First seen: 15 Mar 2026