CVE-2022-27191 (High) detected in github.com/golang/crypto-5ff15b29337e062d850872081bcd9f4d784f4c25 - autoclosed
mend-bolt-for-github opened this issue · 1 comments
CVE-2022-27191 - High Severity Vulnerability
Vulnerable Library - github.com/golang/crypto-5ff15b29337e062d850872081bcd9f4d784f4c25
[mirror] Go supplementary cryptography libraries
Dependency Hierarchy:
- github.com/kubernetes/client-go-v0.21.3 (Root Library)
- github.com/azure/go-autorest/autorest/adal-autorest/azure/auth/v0.5.6
- ❌ github.com/golang/crypto-5ff15b29337e062d850872081bcd9f4d784f4c25 (Vulnerable Library)
- github.com/azure/go-autorest/autorest/adal-autorest/azure/auth/v0.5.6
Found in HEAD commit: 7c7cbc463791d4bd71514bd1e2ff1330e59fb423
Found in base branch: main
Vulnerability Details
The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.
Publish Date: 2022-03-18
URL: CVE-2022-27191
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2022-27191
Release Date: 2022-03-18
Fix Resolution: golang-golang-x-crypto-dev - 1:0.0~git20220315.3147a52-1;golang-go.crypto-dev - 1:0.0~git20220315.3147a52-1
Step up your Open Source Security Game with Mend here
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.