A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.

Subscriptions

Vendors Products
Enterprise Linux Subscribe
Openshift Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-8051-2 libssh vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

Avoid using complex patterns in configuration files and known_hosts.

History

Thu, 26 Mar 2026 21:30:00 +0000


Thu, 26 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.
Title libssh: libssh: Denial of Service via inefficient regular expression processing Libssh: libssh: denial of service via inefficient regular expression processing
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
Weaknesses CWE-1333
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References

Thu, 12 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Libssh
Libssh libssh
Vendors & Products Libssh
Libssh libssh

Wed, 11 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title libssh: libssh: Denial of Service via inefficient regular expression processing
References
Metrics threat_severity

None

cvssV3_0

{'score': 2.2, 'vector': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L'}

threat_severity

Low


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-03-26T21:09:10.732Z

Reserved: 2026-01-14T21:55:01.348Z

Link: CVE-2026-0967

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-26T21:17:00.970

Modified: 2026-03-26T21:17:00.970

Link: CVE-2026-0967

cve-icon Redhat

Severity : Low

Publid Date: 2026-02-10T18:47:09Z

Links: CVE-2026-0967 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-02-12T09:40:07Z

Weaknesses