SB2026030691 - openEuler 24.03 LTS update for libssh
Published: March 6, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Path traversal (CVE-ID: CVE-2026-0964)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can trick the victim into connecting to a malicious SCP server and overwrite arbitrary files on the user's system.
2) Input validation error (CVE-ID: CVE-2026-0967)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input within the match_pattern() function when comparing configuration files or known hosts against the hostname. A local user with ability to modify the configuration file or known_hosts file can crash the application.
Remediation
Install update from vendor's website.