2026-03-26 20:6CVE-2026-0965redhat
PUBLISHED5.2CWE-73

Libssh: libssh: denial of service via improper configuration file handling

A flaw was found in libssh where it can attempt to open arbitrary files during configuration parsing. A local attacker can exploit this by providing a malicious configuration file or when the system is misconfigured. This vulnerability could lead to a Denial of Service (DoS) by causing the system to try and access dangerous files, such as block devices or large system files, which can disrupt normal operations.

Problem type

Affected products

Red Hat

Red Hat Enterprise Linux 10
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 8
Red Hat Enterprise Linux 9
Red Hat OpenShift Container Platform 4

References

GitHub Security Advisories

GHSA-q35q-xwh9-8pgw

A flaw was found in libssh where it can attempt to open arbitrary files during configuration...

https://github.com/advisories/GHSA-q35q-xwh9-8pgw

A flaw was found in libssh where it can attempt to open arbitrary files during configuration parsing. A local attacker can exploit this by providing a malicious configuration file or when the system is misconfigured. This vulnerability could lead to a Denial of Service (DoS) by causing the system to try and access dangerous files, such as block devices or large system files, which can disrupt normal operations.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-0965
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-0965",
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "dateUpdated": "2026-03-26T20:06:33.336Z",
    "dateReserved": "2026-01-14T21:54:51.315Z",
    "datePublished": "2026-03-26T20:06:33.336Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat",
        "dateUpdated": "2026-03-26T20:06:33.336Z"
      },
      "datePublic": "2026-02-10T18:47:22.524Z",
      "title": "Libssh: libssh: denial of service via improper configuration file handling",
      "descriptions": [
        {
          "lang": "en",
          "value": "A flaw was found in libssh where it can attempt to open arbitrary files during configuration parsing. A local attacker can exploit this by providing a malicious configuration file or when the system is misconfigured. This vulnerability could lead to a Denial of Service (DoS) by causing the system to try and access dangerous files, such as block devices or large system files, which can disrupt normal operations."
        }
      ],
      "affected": [
        {
          "vendor": "Red Hat",
          "product": "Red Hat Enterprise Linux 10",
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "packageName": "libssh",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:10"
          ],
          "defaultStatus": "affected"
        },
        {
          "vendor": "Red Hat",
          "product": "Red Hat Enterprise Linux 6",
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "packageName": "libssh2",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:6"
          ],
          "defaultStatus": "unaffected"
        },
        {
          "vendor": "Red Hat",
          "product": "Red Hat Enterprise Linux 7",
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "packageName": "libssh2",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:7"
          ],
          "defaultStatus": "unaffected"
        },
        {
          "vendor": "Red Hat",
          "product": "Red Hat Enterprise Linux 8",
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "packageName": "libssh",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:8"
          ],
          "defaultStatus": "affected"
        },
        {
          "vendor": "Red Hat",
          "product": "Red Hat Enterprise Linux 9",
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "packageName": "libssh",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:9"
          ],
          "defaultStatus": "affected"
        },
        {
          "vendor": "Red Hat",
          "product": "Red Hat OpenShift Container Platform 4",
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "packageName": "rhcos",
          "cpes": [
            "cpe:/a:redhat:openshift:4"
          ],
          "defaultStatus": "affected"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "External Control of File Name or Path",
              "cweId": "CWE-73",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://access.redhat.com/security/cve/CVE-2026-0965",
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ]
        },
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436980",
          "name": "RHBZ#2436980",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ]
        }
      ],
      "metrics": [
        {},
        {
          "format": "CVSS",
          "cvssV3_0": {
            "version": "3.0",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "attackVector": "LOCAL",
            "attackComplexity": "LOW",
            "privilegesRequired": "LOW",
            "userInteraction": "NONE",
            "scope": "UNCHANGED",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "availabilityImpact": "LOW",
            "baseScore": 3.3,
            "baseSeverity": "LOW"
          }
        }
      ],
      "workarounds": [
        {
          "lang": "en",
          "value": "Ensure the client and server are using only regular files as configuration."
        }
      ],
      "timeline": [
        {
          "time": "2026-02-04T23:40:45.160Z",
          "lang": "en",
          "value": "Reported to Red Hat."
        },
        {
          "time": "2026-02-10T18:47:22.524Z",
          "lang": "en",
          "value": "Made public."
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Red Hat would like to thank Jakub Jelen (libssh) and Kang Yang for reporting this issue."
        }
      ]
    }
  }
}