[CLSA-2026:1778068515] Fix CVE(s): CVE-2026-0966
Type:
security
Severity:
Important
Release date:
2026-05-06 11:55:20 UTC
Description:
* SECURITY UPDATE: heap buffer underflow in ssh_get_hexa() on zero-length or NULL input, remotely reachable via GSSAPI authentication logging - debian/patches/CVE-2026-0966.patch: reject NULL/zero-length input in ssh_get_hexa() in src/dh.c - CVE-2026-0966: fix heap buffer underflow in ssh_get_hexa()
Updated packages:
  • libssh-4_0.6.3-4.3ubuntu0.6+tuxcare.els5_amd64.deb
    sha:98c5a9c63d327f30cb870d5bc727bf276e18e30e
  • libssh-dev_0.6.3-4.3ubuntu0.6+tuxcare.els5_amd64.deb
    sha:cf671c8575112610fb01c0d059a14cf80e27c512
  • libssh-doc_0.6.3-4.3ubuntu0.6+tuxcare.els5_all.deb
    sha:76cceb522f2a5ac3327053dcf2a641a21cdaa14b
  • libssh-gcrypt-4_0.6.3-4.3ubuntu0.6+tuxcare.els5_amd64.deb
    sha:1a4301ec4d6baddeff792932c61c847dcc487f77
  • libssh-gcrypt-dev_0.6.3-4.3ubuntu0.6+tuxcare.els5_amd64.deb
    sha:c42ab2fee9d245d906a8b0667962f646621b0b03
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.