PT-2026-42708 · Go+1 · Golang.Org/X/Crypto+1

Published

2026-05-22

·

Updated

2026-05-22

·

CVE-2026-39829

CVSS v3.1

7.5

High

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Name of the Vulnerable Software and Affected Versions The product name cannot be determined (affected versions not specified)
Description RSA and DSA public key parsers fail to enforce size limits on key parameters. An unauthenticated client can trigger excessive CPU consumption during signature verification by providing a crafted public key with an oversized modulus or DSA parameter.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Related Identifiers

CVE-2026-39829
GO-2026-5018

Affected Products

Golang.Org/X/Crypto
Golang.Org/X/Crypto/Ssh