CVE-2026-0964

Publication date 13 February 2026

Last updated 1 April 2026


Ubuntu priority

Cvss 3 Severity Score

5.0 · Medium

Score breakdown

Description

A malicious SCP server can send unexpected paths that could make the client application override local files outside of working directory. This could be misused to create malicious executable or configuration files and make the user execute them under specific consequences. This is the same issue as in OpenSSH, tracked as CVE-2019-6111.

Status

Package Ubuntu Release Status
libssh 25.10 questing
Fixed 0.11.2-1ubuntu0.2
24.04 LTS noble
Fixed 0.10.6-2ubuntu0.3
22.04 LTS jammy
Fixed 0.9.6-2ubuntu0.22.04.6
20.04 LTS focal
Fixed 0.9.3-2ubuntu2.5+esm3
18.04 LTS bionic
Fixed 0.8.0~20170825.94fa1e38-1ubuntu0.7+esm6
16.04 LTS xenial
Fixed 0.6.3-4.3ubuntu0.6+esm4

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro 30-day free trial

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libssh

Severity score breakdown

Parameter Value
Base score 5.0 · Medium
Attack vector Network
Attack complexity High
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality Low
Integrity impact Low
Availability impact Low
Vector CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

References

Related Ubuntu Security Notices (USN)

    • USN-8051-1
    • libssh vulnerabilities
    • 18 February 2026
    • USN-8051-2
    • libssh vulnerabilities
    • 23 February 2026

Other references


Access our resources on patching vulnerabilities