CVE-2026-39830
Received Received - Intake
SSH Global Request Response Buffer Overflow in Go

Publication date: 2026-05-22

Last updated on: 2026-05-22

Assigner: Go Project

Description
A malicious SSH peer could send unsolicited global request responses to fill an internal buffer, blocking the connection's read loop. The blocked goroutine could not be released by calling Close(), resulting in a resource leak per connection. Unsolicited global responses are now discarded.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-22
Last Modified
2026-05-22
Generated
2026-05-22
AI Q&A
2026-05-22
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
golang crypto to 0.52.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs when a malicious SSH peer sends unsolicited global request responses to a Go SSH server, which fills an internal buffer and blocks the connection's read loop.

Because the read loop is blocked, the goroutine handling the connection cannot be released even if the connection is closed, leading to a resource leak for each affected connection.

The issue has been fixed by discarding unsolicited global responses to prevent the buffer from filling and blocking the read loop.


How can this vulnerability impact me? :

This vulnerability can cause resource leaks on the server handling SSH connections, as each malicious connection that sends unsolicited global request responses can block a goroutine indefinitely.

Over time, this can exhaust server resources, potentially leading to degraded performance or denial of service due to the accumulation of blocked goroutines.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the golang.org/x/crypto package to version 0.52.0 or later, where unsolicited global SSH request responses are discarded to prevent resource leaks.

This fix addresses the issue by preventing the internal buffer from filling and blocking the connection's read loop, thus avoiding the resource leak per connection.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart