Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-0967

Опубликовано: 10 фев. 2026
Источник: redhat
CVSS3: 2.2
EPSS Низкий

Описание

A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the match_pattern() function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.

Меры по смягчению последствий

Avoid using complex patterns in configuration files and known_hosts.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libsshAffected
Red Hat Enterprise Linux 6libssh2Not affected
Red Hat Enterprise Linux 7libssh2Not affected
Red Hat Enterprise Linux 8libsshFix deferred
Red Hat Enterprise Linux 9libsshAffected
Red Hat OpenShift Container Platform 4rhcosFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-1333
https://bugzilla.redhat.com/show_bug.cgi?id=2436981libssh: libssh: Denial of Service via inefficient regular expression processing

EPSS

Процентиль: 20%
0.00066
Низкий

2.2 Low

CVSS3

Связанные уязвимости

ubuntu
около 2 месяцев назад

[Denial of Service via inefficient regular expression processing]

debian

[Denial of Service via inefficient regular expression processing]

CVSS3: 2.2
github
4 дня назад

A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.

suse-cvrf
27 дней назад

Security update for libssh

suse-cvrf
27 дней назад

Security update for libssh

EPSS

Процентиль: 20%
0.00066
Низкий

2.2 Low

CVSS3