CVE-2026-39835
Description
SSH servers which use CertChecker as a public key callback without setting IsUserAuthority or IsHostAuthority could be caused to panic by a client presenting a certificate. CertChecker now returns an error instead of panicking when these callbacks are nil.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SSH servers using CertChecker without setting IsUserAuthority or IsHostAuthority callbacks panic on a client certificate, now fixed to return an error.
Vulnerability
In the golang.org/x/crypto SSH package, CertChecker is used as a public key callback for authenticating certificates. If the server uses CertChecker but does not set the IsUserAuthority or IsHostAuthority callbacks, a client presenting a crafted certificate can trigger a nil pointer dereference, causing the server to panic. This affects all versions of golang.org/x/crypto before the fix released in response to CVE-2026-39835 (Go issue 79563) [1][3].
Exploitation
An attacker only needs network access to the SSH server and the ability to present a certificate during authentication. No prior authentication or special privilege is required. The attacker sends a specially crafted certificate to the server; because the IsUserAuthority/IsHostAuthority callbacks are nil, CertChecker dereferences them, causing a panic that terminates the server process [1][3].
Impact
Successful exploitation results in a denial of service (DoS) via server crash. The panic causes the SSH server to terminate, disrupting all active connections and preventing new ones. There is no information disclosure or code execution; the impact is solely availability [1].
Mitigation
The fix is in golang.org/x/crypto version [0.35.0] or later, where CertChecker now returns an error when these callbacks are nil instead of panicking. Users should update their dependency to the patched version. There is no workaround other than ensuring both IsUserAuthority and IsHostAuthority callbacks are set. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities (KEV) catalog as of the publication date [1][3].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.