PatchSiren cyber security CVE debrief
CVE-2026-0968 Redhat CVE debrief
CVE-2026-0968, published on 2026-03-26 and last modified on 2026-05-19, affects libssh during SFTP file listing. A malicious server can send a malformed "longname" field in an SSH_FXP_NAME message, and the missing null check may cause an out-of-bounds read on the heap. The supplied record rates this as low severity with availability impact only, but it can still crash affected applications and cause a denial of service.
- Vendor
- Redhat
- Product
- Unknown
- CVSS
- LOW 3.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-03-26
- Original CVE updated
- 2026-05-19
- Advisory published
- 2026-03-26
- Advisory updated
- 2026-05-19
Who should care
Security and platform teams that deploy applications using libssh for SFTP access, especially where clients connect to untrusted or third-party SFTP servers. Downstream package maintainers and Red Hat users should also review the referenced advisories and package updates.
Technical summary
The issue is a missing null check in libssh while processing SFTP directory listings. When a malicious server returns a malformed SSH_FXP_NAME response, the "longname" field can lead to reading beyond allocated heap memory. The supplied CVSS vector is CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L, and the supplied weakness mapping is CWE-476.
Defensive priority
Moderate for exposed SFTP client workflows, despite the low CVSS score. The vulnerability requires a malicious server and user-driven file listing interaction, but affected clients may still crash. Prioritize if your environment connects to untrusted SFTP endpoints or ships libssh in widely used tooling.
Recommended defensive actions
- Inventory systems and applications using libssh, especially versions at or below 0.11.3.
- Apply vendor updates that include the libssh 0.11.4 security release or later.
- Review Red Hat advisories RHSA-2026:18160 and RHSA-2026:18683 for downstream package fixes.
- Validate whether SFTP file listing against untrusted servers is part of your operational workflow and add compensating controls where possible.
- Monitor for application crashes or abnormal behavior in SFTP-enabled clients until patched.
Evidence notes
Evidence comes from the supplied NVD record and Red Hat-linked references. The NVD data identifies libssh versions through 0.11.3 as vulnerable and assigns CVSS 3.1 AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L with CWE-476. The references include Red Hat advisories, a Red Hat CVE page, a Bugzilla entry, and libssh security release notes for 0.12.0 and 0.11.4.
Official resources
-
CVE-2026-0968 CVE record
CVE.org
-
CVE-2026-0968 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Release Notes
Publicly disclosed in the CVE record on 2026-03-26, with the NVD entry modified on 2026-05-19. The supplied references point to Red Hat advisories and libssh security release notes dated 2026-02-10.