CVE-2022-27191 (High) detected in golang.org/x/crypto-v0.0.0-20200510223506-06a226fb4e37 - autoclosed
mend-bolt-for-github opened this issue · comments
CVE-2022-27191 - High Severity Vulnerability
Vulnerable Library - golang.org/x/crypto-v0.0.0-20200510223506-06a226fb4e37
Library home page: https://proxy.golang.org/golang.org/x/crypto/@v/v0.0.0-20200510223506-06a226fb4e37.zip
Dependency Hierarchy:
- github.com/Masterminds/sprig-v2.22.0+incompatible (Root Library)
- ❌ golang.org/x/crypto-v0.0.0-20200510223506-06a226fb4e37 (Vulnerable Library)
Found in HEAD commit: 2aada85674c55286335b211e44ebd8a6e4c394bb
Found in base branch: master
Vulnerability Details
The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.
Publish Date: 2022-03-18
URL: CVE-2022-27191
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2022-27191
Release Date: 2022-03-18
Fix Resolution: golang-golang-x-crypto-dev - 1:0.0~git20220315.3147a52-1;golang-go.crypto-dev - 1:0.0~git20220315.3147a52-1
Step up your Open Source Security Game with Mend here
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.