Описание
[Denial of Service via inefficient regular expression processing]
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| libssh | fixed | 0.12.0-1 | package | |
| libssh | no-dsa | trixie | package | |
| libssh | no-dsa | bookworm | package | |
| libssh | postponed | bullseye | package |
Примечания
https://www.libssh.org/security/advisories/CVE-2026-0967.txt
Fixed by: https://git.libssh.org/projects/libssh.git/commit/?id=6d74aa6138895b3662bade9bd578338b0c4f8a15 (libssh-0.11.4)
EPSS
Связанные уязвимости
[Denial of Service via inefficient regular expression processing]
A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.
A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.
EPSS