Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0967: Inefficient Regular Expression Complexity in Red Hat Red Hat Enterprise Linux 10

0
Low
VulnerabilityCVE-2026-0967cvecve-2026-0967
Published: Thu Mar 26 2026 (03/26/2026, 20:06:30 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

CVE-2026-0967 is a low-severity vulnerability in libssh used by Red Hat Enterprise Linux 10. It involves inefficient regular expression processing in the match_pattern() function when handling crafted hostnames from client configuration or known_hosts files. An attacker with local access and limited privileges could trigger excessive backtracking in regex evaluation, causing timeouts and resource exhaustion. This leads to a denial of service (DoS) condition affecting the client application. Exploitation requires user interaction and high attack complexity, with no impact on confidentiality or integrity. No known exploits are reported in the wild. Organizations using Red Hat Enterprise Linux 10 with libssh should monitor for patches and avoid untrusted client config files to mitigate risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 21:47:04 UTC

Technical Analysis

CVE-2026-0967 identifies a vulnerability in the libssh library component of Red Hat Enterprise Linux 10, specifically within the match_pattern() function that processes hostnames from client configuration files or known_hosts files. The flaw arises due to inefficient handling of regular expressions, where an attacker controlling these files can craft hostnames that cause excessive backtracking during regex evaluation. This inefficient regex complexity leads to significant CPU resource consumption and timeouts, resulting in a denial of service (DoS) for the client application relying on libssh. The vulnerability requires local access with limited privileges and user interaction, as the attacker must influence or supply the client configuration or known_hosts files. The CVSS 3.0 base score is 2.2, reflecting low severity due to the high attack complexity, requirement for user interaction, and limited scope affecting availability only. There is no impact on confidentiality or integrity, and no known exploits have been reported in the wild. The vulnerability highlights the risks of regex-based processing in security-critical libraries and underscores the need for careful input validation and efficient regex design. While no patches are currently linked, monitoring Red Hat advisories for updates is recommended.

Potential Impact

The primary impact of CVE-2026-0967 is a denial of service condition on client systems running Red Hat Enterprise Linux 10 that use libssh. By exploiting inefficient regex backtracking, an attacker can cause the client application to become unresponsive or consume excessive CPU resources, potentially disrupting automated processes or user sessions relying on SSH connections. Although the vulnerability does not compromise confidentiality or integrity, the availability impact can affect operational continuity, especially in environments with automated SSH-based workflows or critical remote management tasks. The requirement for local access and user interaction limits the scope of exploitation, reducing the likelihood of widespread attacks. However, in multi-user systems or environments where untrusted users can modify client configuration files, this vulnerability could be leveraged to degrade service. Organizations with high availability requirements or those running critical infrastructure on Red Hat Enterprise Linux 10 should consider this risk in their threat models.

Mitigation Recommendations

To mitigate CVE-2026-0967, organizations should implement the following specific measures: 1) Restrict write permissions on client configuration and known_hosts files to trusted users only, preventing untrusted modification that could introduce malicious hostnames. 2) Monitor and audit changes to SSH client configuration files to detect unauthorized or suspicious modifications. 3) Limit local user privileges to reduce the risk of an attacker influencing client-side SSH configurations. 4) Employ resource limits (e.g., CPU time, process limits) on SSH client processes to contain potential resource exhaustion. 5) Stay current with Red Hat security advisories and apply patches promptly once available for libssh or related components. 6) Consider using alternative SSH client implementations or updated libssh versions that address regex inefficiencies. 7) Educate users about the risks of accepting or using untrusted SSH configuration files. These targeted actions go beyond generic advice by focusing on controlling the attack vector and containing resource impact.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-01-14T21:55:01.348Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69c5a54c3c064ed76fcfc863

Added to database: 3/26/2026, 9:29:48 PM

Last enriched: 3/26/2026, 9:47:04 PM

Last updated: 3/27/2026, 5:27:11 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses