| { |
| "schema_version": "1.3.1", |
| "id": "GO-2022-0968", |
| "modified": "0001-01-01T00:00:00Z", |
| "published": "2022-09-13T03:32:38Z", |
| "aliases": [ |
| "CVE-2021-43565", |
| "GHSA-gwc9-m7rh-j2ww" |
| ], |
| "summary": "Panic on malformed packets in golang.org/x/crypto/ssh", |
| "details": "Unauthenticated clients can cause a panic in SSH servers.\n\nWhen using AES-GCM or ChaCha20Poly1305, consuming a malformed packet which contains an empty plaintext causes a panic.", |
| "affected": [ |
| { |
| "package": { |
| "name": "golang.org/x/crypto", |
| "ecosystem": "Go" |
| }, |
| "ranges": [ |
| { |
| "type": "SEMVER", |
| "events": [ |
| { |
| "introduced": "0" |
| }, |
| { |
| "fixed": "0.0.0-20211202192323-5770296d904e" |
| } |
| ] |
| } |
| ], |
| "ecosystem_specific": { |
| "imports": [ |
| { |
| "path": "golang.org/x/crypto/ssh", |
| "symbols": [ |
| "Dial", |
| "NewClientConn", |
| "NewServerConn", |
| "chacha20Poly1305Cipher.readCipherPacket", |
| "gcmCipher.readCipherPacket" |
| ] |
| } |
| ] |
| } |
| } |
| ], |
| "references": [ |
| { |
| "type": "WEB", |
| "url": "https://groups.google.com/g/golang-announce/c/2AR1sKiM-Qs" |
| }, |
| { |
| "type": "REPORT", |
| "url": "https://go.dev/issues/49932" |
| }, |
| { |
| "type": "FIX", |
| "url": "https://go.dev/cl/368814/" |
| } |
| ], |
| "credits": [ |
| { |
| "name": "Rod Hynes (Psiphon Inc)" |
| } |
| ], |
| "database_specific": { |
| "url": "https://pkg.go.dev/vuln/GO-2022-0968" |
| } |
| } |