CVE-2026-0964

EUVD-2026-16326
A malicious SCP server can send unexpected paths that could make the
client application override local files outside of working directory.
This could be misused to create malicious executable or configuration
files and make the user execute them under specific consequences.

This is the same issue as in OpenSSH, tracked as CVE-2019-6111.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 3%
Affected Products (NVD)
VendorProductVersion
libsshlibssh
𝑥
< 0.11.4
redhathardened_images
-
redhatopenshift_container_platform
4.0
redhatenterprise_linux
8.0
redhatenterprise_linux
9.0
redhatenterprise_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libssh
bookworm
no-dsa
bookworm (security)
vulnerable
bullseye
postponed
bullseye (security)
vulnerable
forky
0.12.0-3
fixed
sid
0.12.0-3
fixed
trixie
no-dsa
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
libssh-config
suse enterprise desktop 15 SP7
0.9.8-150600.11.9.1
fixed
suse enterprise sap 15 SP7
0.9.8-150600.11.9.1
fixed
suse enterprise server 15 SP4
0.9.8-150400.3.17.1
fixed
suse enterprise server 15 SP7
0.9.8-150600.11.9.1
fixed
libssh-devel
suse enterprise desktop 15 SP7
0.9.8-150600.11.9.1
fixed
suse enterprise sap 15 SP7
0.9.8-150600.11.9.1
fixed
suse enterprise server 15 SP4
0.9.8-150400.3.17.1
fixed
suse enterprise server 15 SP7
0.9.8-150600.11.9.1
fixed
libssh4
suse enterprise desktop 15 SP7
0.9.8-150600.11.9.1
fixed
suse enterprise sap 15 SP7
0.9.8-150600.11.9.1
fixed
suse enterprise server 15 SP4
0.9.8-150400.3.17.1
fixed
suse enterprise server 15 SP7
0.9.8-150600.11.9.1
fixed
libssh4-32bit
suse enterprise desktop 15 SP7
0.9.8-150600.11.9.1
fixed
suse enterprise sap 15 SP7
0.9.8-150600.11.9.1
fixed
suse enterprise server 15 SP4
0.9.8-150400.3.17.1
fixed
suse enterprise server 15 SP7
0.9.8-150600.11.9.1
fixed