CVE Vulnerabilities

CVE-2026-0966

This vulnerability is marked as RESERVED by NVD. This means that the CVE-ID is reserved for future use by the CVE Numbering Authority (CNA) or a security researcher, but the details of it are not yet publicly available yet.

This page will reflect the classification results once they are available through NVD.

Any vendor information available is shown as below.

Redhat

libssh: Buffer underflow in ssh_get_hexa() on invalid input

Mitigation

To mitigate this issue, consider disabling GSSAPI authentication if it is not required, or reduce the LogLevel in the sshd_config file to a value lower than SSH_LOG_PACKET (e.g., INFO). To disable GSSAPI authentication, add or modify the following line in /etc/ssh/sshd_config: GSSAPIAuthentication no To reduce logging verbosity, add or modify the following line in /etc/ssh/sshd_config: LogLevel INFO After making changes to sshd_config, the sshd service must be restarted for the changes to take effect. This may temporarily interrupt active SSH sessions.

Ubuntu

[Buffer underflow in ssh_get_hexa() on invalid input]

Affected Software List

NameVendorVersion
LibsshUbuntu/noble0.10.6-2ubuntu0.3
LibsshUbuntu/questing0.11.2-1ubuntu0.2
LibsshUbuntu/upstream0.11.4
LibsshUbuntu/esm-infra/bionicTBD
LibsshUbuntu/esm-infra/focalTBD
LibsshUbuntu/esm-infra/xenialTBD
LibsshUbuntu/jammy0.9.6-2ubuntu0.22.04.6