๐Ÿ” CVE Alert

CVE-2026-0967

LOW 2.2

Libssh: libssh: denial of service via inefficient regular expression processing

CVSS Score
2.2
EPSS Score
0.1%
EPSS Percentile
24th

A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.

CWE CWE-1333
Vendor red hat
Product red hat enterprise linux 10
Published Mar 26, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for red hat red hat enterprise linux 10

Be the first to know when new low vulnerabilities affecting red hat red hat enterprise linux 10 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L

Affected Versions

Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Hardened Images
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/security/cve/CVE-2026-0967 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2436981 libssh.org: https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/

Credits

Red Hat would like to thank Jakub Jelen (libssh) and Kang Yang for reporting this issue.