Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0968: NULL Pointer Dereference in Red Hat Red Hat Enterprise Linux 10

0
Low
VulnerabilityCVE-2026-0968cvecve-2026-0968
Published: Thu Mar 26 2026 (03/26/2026, 20:06:29 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

CVE-2026-0968 is a vulnerability in libssh used by Red Hat Enterprise Linux 10 where a malicious SFTP server can send a malformed 'longname' field in an SSH_FXP_NAME message during file listing. This triggers a NULL pointer dereference due to a missing null check, causing the client to read beyond allocated heap memory. The flaw can lead to application crashes resulting in denial of service (DoS). Exploitation requires user interaction and a high attack complexity, with no privileges needed. The vulnerability does not impact confidentiality or integrity but affects availability. No known exploits are currently reported in the wild. The CVSS score is low (3. 1), reflecting limited impact and difficulty of exploitation. Organizations using Red Hat Enterprise Linux 10 with libssh in SFTP client roles should apply patches once available and consider network-level protections against untrusted SFTP servers.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 21:46:53 UTC

Technical Analysis

CVE-2026-0968 identifies a NULL pointer dereference vulnerability in libssh, a widely used SSH library, specifically affecting Red Hat Enterprise Linux 10. The issue arises when a malicious SFTP server sends a malformed 'longname' field within an SSH_FXP_NAME message during a file listing operation. The client-side libssh code fails to perform a necessary null check before dereferencing this field, leading to reading beyond the allocated heap memory. This memory access violation can cause the SFTP client application to crash unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability requires the client to initiate a connection and interact with a malicious SFTP server, making user interaction necessary. The attack complexity is high because crafting the malformed message requires precise control over the SFTP server behavior. There is no impact on confidentiality or integrity since the flaw does not allow data leakage or modification. The vulnerability is rated with a CVSS 3.0 base score of 3.1, indicating low severity. No known exploits have been observed in the wild, and no patches or mitigations have been explicitly linked in the provided data, though Red Hat is the vendor responsible for addressing the issue. This vulnerability highlights the importance of robust input validation in protocol implementations to prevent memory safety errors.

Potential Impact

The primary impact of CVE-2026-0968 is denial of service due to application crashes in SFTP clients using libssh on Red Hat Enterprise Linux 10. Organizations relying on automated or manual SFTP file transfers may experience service interruptions if connecting to a malicious or compromised SFTP server. While the vulnerability does not compromise confidentiality or integrity, availability disruptions can affect business operations, especially in environments with critical file transfer workflows. The requirement for user interaction and high attack complexity limits the scope of exploitation, reducing the likelihood of widespread impact. However, targeted attacks against organizations that frequently connect to external or untrusted SFTP servers could leverage this flaw to disrupt services. The absence of known exploits in the wild suggests limited current risk, but the vulnerability remains a concern for maintaining operational stability and resilience.

Mitigation Recommendations

To mitigate CVE-2026-0968, organizations should monitor Red Hat advisories and apply security patches to libssh and Red Hat Enterprise Linux 10 as soon as they become available. In the interim, restrict SFTP client connections to trusted servers only, employing network-level controls such as firewall rules or VPNs to limit exposure to potentially malicious SFTP servers. Implement application-layer filtering or proxy solutions that can validate or sanitize SFTP protocol messages to detect malformed inputs. Educate users about the risks of connecting to untrusted SFTP servers and enforce policies that minimize user-initiated connections to unknown hosts. Additionally, consider deploying runtime protections such as memory safety tools or sandboxing for SFTP client applications to reduce the impact of potential crashes. Regularly review logs and monitoring systems for unusual SFTP client failures that could indicate exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-01-14T21:55:14.053Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69c5a54c3c064ed76fcfc868

Added to database: 3/26/2026, 9:29:48 PM

Last enriched: 3/26/2026, 9:46:53 PM

Last updated: 3/26/2026, 10:50:43 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses