-
Notifications
You must be signed in to change notification settings - Fork 18.1k
x/crypto/ssh: empty plaintext packet causes panic #49932
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Labels
Milestone
Comments
Change https://golang.org/cl/368814 mentions this issue: |
This CVE 2021-43565 has a status of RESERVED by CVE, but should be public soon: https://nvd.nist.gov/vuln/detail/CVE-2021-43565 |
thaJeztah
added a commit
to thaJeztah/buildkit
that referenced
this issue
Dec 3, 2021
full diff: golang/crypto@0c34fe9...5770296 includes a fix in golang.org/x/crypto/ssh for CVE-2021-43565 - golang/go#49932 - golang/crypto@5770296 Signed-off-by: Sebastiaan van Stijn <[email protected]>
thaJeztah
added a commit
to thaJeztah/docker
that referenced
this issue
Dec 3, 2021
full diff: golang/crypto@0c34fe9...5770296 includes a fix in golang.org/x/crypto/ssh for CVE-2021-43565 - golang/go#49932 - golang/crypto@5770296 Signed-off-by: Sebastiaan van Stijn <[email protected]>
thaJeztah
added a commit
to thaJeztah/docker
that referenced
this issue
Dec 3, 2021
full diff: golang/crypto@0c34fe9...5770296 includes a fix in golang.org/x/crypto/ssh for CVE-2021-43565 - golang/go#49932 - golang/crypto@5770296 Signed-off-by: Sebastiaan van Stijn <[email protected]>
wadey
added a commit
to slackhq/nebula
that referenced
this issue
Dec 6, 2021
> Version v0.0.0-20211202192323-5770296d904e of golang.org/x/crypto fixes a vulnerability in the golang.org/x/crypto/ssh package which allowed unauthenticated clients to cause a panic in SSH servers. > > This issue was discovered and reported by Rod Hynes, Psiphon Inc., and is tracked as CVE-2021-43565 and Issue golang/go#49932. Updated golang.org/x/crypto golang/crypto@089bfa5...5770296 Updated golang.org/x/net golang/net@4a448f8...69e39ba
wadey
added a commit
to slackhq/nebula
that referenced
this issue
Dec 6, 2021
> Version v0.0.0-20211202192323-5770296d904e of golang.org/x/crypto fixes a vulnerability in the golang.org/x/crypto/ssh package which allowed unauthenticated clients to cause a panic in SSH servers. > > This issue was discovered and reported by Rod Hynes, Psiphon Inc., and is tracked as CVE-2021-43565 and Issue golang/go#49932. Updated golang.org/x/crypto golang/crypto@089bfa5...5770296 Updated golang.org/x/net golang/net@4a448f8...69e39ba
vasiliy-ul
added a commit
to vasiliy-ul/kubevirt
that referenced
this issue
Dec 21, 2021
Version v0.0.0-20211202192323-5770296d904e of golang.org/x/crypto fixes a vulnerability in the golang.org/x/crypto/ssh package which allowed unauthenticated clients to cause a panic in SSH servers. Reference: golang/go#49932 golang/crypto@5770296 https://bugzilla.redhat.com/show_bug.cgi?id=2030787 https://bugzilla.suse.com/show_bug.cgi?id=1193930 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43565 Signed-off-by: Vasiliy Ulyanov <[email protected]>
kubevirt-bot
pushed a commit
to kubevirt-bot/kubevirt
that referenced
this issue
Dec 21, 2021
Version v0.0.0-20211202192323-5770296d904e of golang.org/x/crypto fixes a vulnerability in the golang.org/x/crypto/ssh package which allowed unauthenticated clients to cause a panic in SSH servers. Reference: golang/go#49932 golang/crypto@5770296 https://bugzilla.redhat.com/show_bug.cgi?id=2030787 https://bugzilla.suse.com/show_bug.cgi?id=1193930 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-43565 Signed-off-by: Vasiliy Ulyanov <[email protected]>
evol262
pushed a commit
to evol262/moby
that referenced
this issue
Jan 12, 2022
full diff: golang/crypto@0c34fe9...5770296 includes a fix in golang.org/x/crypto/ssh for CVE-2021-43565 - golang/go#49932 - golang/crypto@5770296 Signed-off-by: Sebastiaan van Stijn <[email protected]>
iamacarpet
pushed a commit
to affordablemobiles/xcrypto
that referenced
this issue
Aug 2, 2022
When reading GCM and ChaChaPoly1305 packets, don't make assumptions about the size of the enciphered plaintext. This fixes two panics caused by standards non-compliant malformed packets. Thanks to Rod Hynes, Psiphon Inc. for reporting this issue. Fixes golang/go#49932 Fixes CVE-2021-43565 Change-Id: I660cff39d197e0d04ec44d11d792b22d954df2ef Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1262659 Reviewed-by: Katie Hockman <[email protected]> Reviewed-by: Julie Qiu <[email protected]> Reviewed-on: https://go-review.googlesource.com/c/crypto/+/368814 Trust: Roland Shoemaker <[email protected]> Trust: Katie Hockman <[email protected]> Run-TryBot: Roland Shoemaker <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Julie Qiu <[email protected]> Reviewed-by: Katie Hockman <[email protected]>
LewiGoddard
pushed a commit
to LewiGoddard/crypto
that referenced
this issue
Feb 16, 2023
When reading GCM and ChaChaPoly1305 packets, don't make assumptions about the size of the enciphered plaintext. This fixes two panics caused by standards non-compliant malformed packets. Thanks to Rod Hynes, Psiphon Inc. for reporting this issue. Fixes golang/go#49932 Fixes CVE-2021-43565 Change-Id: I660cff39d197e0d04ec44d11d792b22d954df2ef Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1262659 Reviewed-by: Katie Hockman <[email protected]> Reviewed-by: Julie Qiu <[email protected]> Reviewed-on: https://go-review.googlesource.com/c/crypto/+/368814 Trust: Roland Shoemaker <[email protected]> Trust: Katie Hockman <[email protected]> Run-TryBot: Roland Shoemaker <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Julie Qiu <[email protected]> Reviewed-by: Katie Hockman <[email protected]>
BiiChris
pushed a commit
to BiiChris/crypto
that referenced
this issue
Sep 15, 2023
When reading GCM and ChaChaPoly1305 packets, don't make assumptions about the size of the enciphered plaintext. This fixes two panics caused by standards non-compliant malformed packets. Thanks to Rod Hynes, Psiphon Inc. for reporting this issue. Fixes golang/go#49932 Fixes CVE-2021-43565 Change-Id: I660cff39d197e0d04ec44d11d792b22d954df2ef Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1262659 Reviewed-by: Katie Hockman <[email protected]> Reviewed-by: Julie Qiu <[email protected]> Reviewed-on: https://go-review.googlesource.com/c/crypto/+/368814 Trust: Roland Shoemaker <[email protected]> Trust: Katie Hockman <[email protected]> Run-TryBot: Roland Shoemaker <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Julie Qiu <[email protected]> Reviewed-by: Katie Hockman <[email protected]>
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
When using AES-GCM or ChaCha20Poly1305, consuming a malformed packet which contains empty plaintext causes a panic, due to the assumption that there will always be at least one byte, containing the number of padding bytes.
The text was updated successfully, but these errors were encountered: