A flaw was found in libssh. A remote attacker, by controlling client configuration files or known_hosts files, could craft specific hostnames that when processed by the `match_pattern()` function can lead to inefficient regular expression backtracking. This can cause timeouts and resource exhaustion, resulting in a Denial of Service (DoS) for the client.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-0967 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2436981 | Third Party Advisory |
| https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/ | Release Notes |
Configurations
Configuration 1 (hide)
|
History
02 Apr 2026, 17:28
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Redhat
Libssh Redhat enterprise Linux Libssh libssh |
|
| References | () https://access.redhat.com/security/cve/CVE-2026-0967 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2436981 - Third Party Advisory | |
| References | () https://www.libssh.org/2026/02/10/libssh-0-12-0-and-0-11-4-security-releases/ - Release Notes | |
| CPE | cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* |
30 Mar 2026, 13:26
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
26 Mar 2026, 21:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-26 21:17
Updated : 2026-04-02 17:28
NVD link : CVE-2026-0967
Mitre link : CVE-2026-0967
CVE.ORG link : CVE-2026-0967
JSON object : View
Products Affected
redhat
- enterprise_linux
libssh
- libssh
CWE
CWE-1333
Inefficient Regular Expression Complexity
