First published: Tue Mar 15 2022(Updated: )
A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms based on SHA-2, enabling an attacker to crash the server, resulting in a loss of availability.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/golang.org/x/crypto | <0.0.0-20220314234659-1baeb1ce4c0b | 0.0.0-20220314234659-1baeb1ce4c0b |
redhat/openshift-serverless-clients | <0:1.5.0-3.el8 | 0:1.5.0-3.el8 |
redhat/podman | <2:4.2.0-3.el9 | 2:4.2.0-3.el9 |
redhat/buildah | <1:1.27.0-2.el9 | 1:1.27.0-2.el9 |
redhat/cri-o | <0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8 | 0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8 |
redhat/openshift-clients | <0:4.13.0-202305291355.p0.g1024efc.assembly.stream.el8 | 0:4.13.0-202305291355.p0.g1024efc.assembly.stream.el8 |
redhat/kubevirt | <0:4.11.0-643.el7 | 0:4.11.0-643.el7 |
redhat/kubevirt | <0:4.11.0-643.el8 | 0:4.11.0-643.el8 |
redhat/golang.org/x/crypto/ssh v0.0.0-20220315160706 | <3147 | 3147 |
golang ssh | <0.0.0-20220314234659-1baeb1ce4c0b | |
Fedora EPEL | =8.0 | |
Fedora | =34 | |
Fedora | =35 | |
Fedora | =36 | |
redhat advanced cluster management for kubernetes | =2.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query on Cloud Pak for Data | <=2.2 | |
IBM Watson Query on Cloud Pak for Data | <=2.1 | |
IBM Watson Query on Cloud Pak for Data | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-27191 is a vulnerability in the golang.org/x/crypto/ssh package that allows an attacker to crash a server by failing authentication with RSA keys.
CVE-2022-27191 has a severity level of high.
CVE-2022-27191 causes a client to fail authentication with RSA keys to servers that reject SHA-2 signature algorithms.
To fix CVE-2022-27191, upgrade to golang.org/x/crypto/ssh version 0.0.0-20220314234659-1baeb1ce4c0b or later.
Yes, you can find references for CVE-2022-27191 at the following links: [link1], [link2], [link3].