When writing data larger than 4GB in a single Write call on an SSH channel, an integer overflow in the internal payload size calculation caused the write loop to spin indefinitely, sending empty packets without making progress. The size comparison now uses int64 to prevent truncation.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 22 May 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-680 |
Fri, 22 May 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When writing data larger than 4GB in a single Write call on an SSH channel, an integer overflow in the internal payload size calculation caused the write loop to spin indefinitely, sending empty packets without making progress. The size comparison now uses int64 to prevent truncation. | |
| Title | Invoking infinite loop on large channel writes in golang.org/x/crypto/ssh | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2026-05-22T02:31:27.540Z
Reserved: 2026-04-07T18:13:03.529Z
Link: CVE-2026-39834
No data.
Status : Received
Published: 2026-05-22T04:16:24.237
Modified: 2026-05-22T04:16:24.237
Link: CVE-2026-39834
No data.
OpenCVE Enrichment
Updated: 2026-05-22T04:30:25Z
Weaknesses