First published: Tue Mar 15 2022(Updated: )
A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms based on SHA-2, enabling an attacker to crash the server, resulting in a loss of availability.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Golang Ssh | <0.0.0-20220314234659-1baeb1ce4c0b | |
Fedoraproject Extra Packages For Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Redhat Advanced Cluster Management For Kubernetes | =2.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
go/golang.org/x/crypto | <0.0.0-20220314234659-1baeb1ce4c0b | 0.0.0-20220314234659-1baeb1ce4c0b |
redhat/openshift-serverless-clients | <0:1.5.0-3.el8 | 0:1.5.0-3.el8 |
redhat/podman | <2:4.2.0-3.el9 | 2:4.2.0-3.el9 |
redhat/buildah | <1:1.27.0-2.el9 | 1:1.27.0-2.el9 |
redhat/cri-o | <0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8 | 0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8 |
redhat/openshift-clients | <0:4.13.0-202305291355.p0.g1024efc.assembly.stream.el8 | 0:4.13.0-202305291355.p0.g1024efc.assembly.stream.el8 |
redhat/kubevirt | <0:4.11.0-643.el7 | 0:4.11.0-643.el7 |
redhat/kubevirt | <0:4.11.0-643.el8 | 0:4.11.0-643.el8 |
redhat/golang.org/x/crypto/ssh v0.0.0-20220315160706 | <3147 | 3147 |
IBM Cloud Pak for Security | <=1.10.0.0 - 1.10.11.0 | |
IBM QRadar Suite Software | <=1.10.12.0 - 1.10.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-27191 is a vulnerability in the golang.org/x/crypto/ssh package that allows an attacker to crash a server by failing authentication with RSA keys.
CVE-2022-27191 has a severity level of high.
CVE-2022-27191 causes a client to fail authentication with RSA keys to servers that reject SHA-2 signature algorithms.
To fix CVE-2022-27191, upgrade to golang.org/x/crypto/ssh version 0.0.0-20220314234659-1baeb1ce4c0b or later.
Yes, you can find references for CVE-2022-27191 at the following links: [link1], [link2], [link3].