Impact
A flaw in libssh allows it to attempt opening arbitrary files while parsing configuration, which can cause the system to access dangerous files such as block devices or large system files. This results in a denial of service, disrupting normal operations without compromising confidentiality or integrity. The weakness corresponds to unsanitized file path handling (CWE-73).
Affected Systems
Red Hat Enterprise Linux 6 through 10, Red Hat Hardened Images, and Red Hat OpenShift Container Platform 4 all use libssh and are affected. The vulnerability affects systems that rely on libssh for configuration processing, regardless of the specific libssh version bundled with these distributions.
Risk and Exploitability
The CVSS score of 3.3 indicates low to moderate risk, and the EPSS score of less than 1% suggests a very low probability of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Exploitation likely requires a local or privileged attacker to supply a malicious configuration file or otherwise misconfigure the system. While the impact is limited to service disruption, it can be significant in environments that rely on continuous availability.
OpenCVE Enrichment
Ubuntu USN