A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol) server can exploit this by sending a malformed 'longname' field within an `SSH_FXP_NAME` message during a file listing operation. This missing null check can lead to reading beyond allocated memory on the heap. This can cause unexpected behavior or lead to a denial of service (DoS) due to application crashes.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-0968 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2436982 | Third Party Advisory |
| https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/ | Release Notes |
Configurations
Configuration 1 (hide)
|
History
03 Apr 2026, 20:06
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Redhat
Libssh Redhat enterprise Linux Libssh libssh |
|
| References | () https://access.redhat.com/security/cve/CVE-2026-0968 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2436982 - Third Party Advisory | |
| References | () https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/ - Release Notes | |
| CPE | cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
30 Mar 2026, 13:26
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
26 Mar 2026, 21:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-26 21:17
Updated : 2026-04-03 20:06
NVD link : CVE-2026-0968
Mitre link : CVE-2026-0968
CVE.ORG link : CVE-2026-0968
JSON object : View
Products Affected
redhat
- enterprise_linux
libssh
- libssh
CWE
CWE-476
NULL Pointer Dereference
