Description
When writing data larger than 4GB in a single Write call on an SSH channel, an integer overflow in the internal payload size calculation caused the write loop to spin indefinitely, sending empty packets without making progress. The size comparison now uses int64 to prevent truncation.
Published: 2026-05-22
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A buffer size calculation in golang.org/x/crypto/ssh overflows when a client attempts to write more than 4 gigabytes across a single SSH channel Write call. The overflow causes the internal loop that transmits data packets to spin indefinitely without transmitting payload, sending empty packets continuously until the process is killed. This results in a denial of service by exhausting CPU and network resources on whichever side of the channel handles the loop, without compromising confidentiality or integrity.

Affected Systems

The vulnerability affects the golang.org/x/crypto package, specifically the ssh module. No explicit version information is provided, so any deployment that uses a pre‑fix release of this module could be vulnerable. Administrators should verify whether their code or binaries include the patched version that switches to int64 arithmetic.

Risk and Exploitability

No EPSS score is available and the vulnerability has not been listed in the CISA KEV catalog, indicating no known widespread exploitation at the time of analysis. The CVSS score is not provided, but the vulnerability’s denial of service nature carries moderate to high risk, particularly for exposed SSH services that can be triggered remotely by an attacker uploading large payloads. The lack of active exploits suggests the risk is primarily in the self‑service impact on the affected system rather than in zero‑day attacks.

Generated by OpenCVE AI on May 22, 2026 at 04:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade golang.org/x/crypto/ssh to a release that incorporates the int64 size comparison fix referenced in the advisory
  • Restart all SSH servers and clients that use the updated package to ensure the fix takes effect
  • Add defensive checks or configure SSH utilities to reject Write calls exceeding a reasonable size threshold to mitigate accidental or malicious large writes

Generated by OpenCVE AI on May 22, 2026 at 04:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 04:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-680

Fri, 22 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description When writing data larger than 4GB in a single Write call on an SSH channel, an integer overflow in the internal payload size calculation caused the write loop to spin indefinitely, sending empty packets without making progress. The size comparison now uses int64 to prevent truncation.
Title Invoking infinite loop on large channel writes in golang.org/x/crypto/ssh
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-05-22T02:31:27.540Z

Reserved: 2026-04-07T18:13:03.529Z

Link: CVE-2026-39834

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-22T04:16:24.237

Modified: 2026-05-22T04:16:24.237

Link: CVE-2026-39834

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T04:30:25Z

Weaknesses