Input Validation Flaw in SSH API Function Affecting Red Hat Software
CVE-2026-0966
6.5MEDIUM
What is CVE-2026-0966?
The SSH API function ssh_get_hexa() has a vulnerability when it processes zero-length input. This function is critical for internal operations such as generating fingerprints and logging OIDs during GSSAPI authentication. When GSSAPI authentication is enabled on the server and logging verbosity is set to a minimum level, this issue can be exploited to trigger a self-denial-of-service condition in the daemon process associated with the SSH connection.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
References
CVSS V3.0
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Red Hat would like to thank Jakub Jelen (libssh), Jun Xu, Kang Yang, and Yunhang Zhang for reporting this issue.