An authenticated SSH client that repeatedly opened channels which were rejected by the server caused unbounded memory growth, eventually crashing the server process and affecting all connected users. Rejected channels are now properly removed from the connection's internal state and released for garbage collection.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 22 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Golang
Golang ssh |
|
| Vendors & Products |
Golang
Golang ssh |
Fri, 22 May 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated SSH client that repeatedly opened channels which were rejected by the server caused unbounded memory growth, eventually crashing the server process and affecting all connected users. Rejected channels are now properly removed from the connection's internal state and released for garbage collection. | |
| Title | Invoking memory leak when rejecting channels can lead to DoS in golang.org/x/crypto/ssh | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2026-05-22T02:31:27.064Z
Reserved: 2026-04-07T18:13:03.528Z
Link: CVE-2026-39827
No data.
Status : Received
Published: 2026-05-22T04:16:21.497
Modified: 2026-05-22T04:16:21.497
Link: CVE-2026-39827
No data.
OpenCVE Enrichment
Updated: 2026-05-22T12:38:10Z
Weaknesses
No weakness.