Description
An authenticated SSH client that repeatedly opened channels which were rejected by the server caused unbounded memory growth, eventually crashing the server process and affecting all connected users. Rejected channels are now properly removed from the connection's internal state and released for garbage collection.
Published: 2026-05-22
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An authenticated SSH client that repeatedly opens channels that the server rejects triggers an unbounded memory leak. The library fails to remove rejected channel metadata, allowing memory usage to grow until the SSH server process crashes, resulting in a denial of service for all connected users. This flaw is a classic memory allocation bug and falls under a resource exhaustion weakness.

Affected Systems

Impact applies to the golang.org/x/crypto/ssh library provided by the Go project. No specific vulnerable versions are listed, so any deployment that relies on this library without the fix is at risk. The fix removes rejected channels from the connection state and relies on garbage collection to reclaim memory.

Risk and Exploitability

An attacker must first authenticate to the SSH server to send channel requests; repeated authenticated channel attempts can exploit the leak. Because the vulnerability can be triggered by an ordinary SSH client, the practical difficulty is low, and the potential impact is high, leading to a severe denial of service. The vulnerability is not listed in CISA's KEV catalog and no exploitable EPSS score is available, but the lack of mitigation in older releases makes the risk significant if the library is in use.

Generated by OpenCVE AI on May 22, 2026 at 04:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade golang.org/x/crypto/ssh to the latest patched release, ensuring rejected channels are properly cleared.
  • Configure the SSH server to limit the number of channel requests per session or per client to reduce repeated attempts from a single connection.
  • Monitor the server’s memory consumption; set alerts for abnormal growth and restart the SSH daemon if thresholds are exceeded.

Generated by OpenCVE AI on May 22, 2026 at 04:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description An authenticated SSH client that repeatedly opened channels which were rejected by the server caused unbounded memory growth, eventually crashing the server process and affecting all connected users. Rejected channels are now properly removed from the connection's internal state and released for garbage collection.
Title Invoking memory leak when rejecting channels can lead to DoS in golang.org/x/crypto/ssh
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-05-22T02:31:27.064Z

Reserved: 2026-04-07T18:13:03.528Z

Link: CVE-2026-39827

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-22T04:16:21.497

Modified: 2026-05-22T04:16:21.497

Link: CVE-2026-39827

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T04:30:25Z

Weaknesses

No weakness.