When writing data larger than 4GB in a single Write call on an SSH channel, an integer overflow in the internal payload size calculation caused the write loop to spin indefinitely, sending empty packets without making progress. The size comparison now uses int64 to prevent truncation.
Metrics
Affected Vendors & Products
References
History
Fri, 22 May 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-680 |
Fri, 22 May 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When writing data larger than 4GB in a single Write call on an SSH channel, an integer overflow in the internal payload size calculation caused the write loop to spin indefinitely, sending empty packets without making progress. The size comparison now uses int64 to prevent truncation. | |
| Title | Invoking infinite loop on large channel writes in golang.org/x/crypto/ssh | |
| References |
|
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2026-05-22T02:31:27.540Z
Reserved: 2026-04-07T18:13:03.529Z
Link: CVE-2026-39834
No data.
Status : Received
Published: 2026-05-22T04:16:24.237
Modified: 2026-05-22T04:16:24.237
Link: CVE-2026-39834
No data.
OpenCVE Enrichment
Updated: 2026-05-22T04:30:25Z