PT-2026-42708 · Go+1 · Golang.Org/X/Crypto+1
Published
2026-05-22
·
Updated
2026-05-22
·
CVE-2026-39829
CVSS v3.1
7.5
High
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions
The product name cannot be determined (affected versions not specified)
Description
RSA and DSA public key parsers fail to enforce size limits on key parameters. An unauthenticated client can trigger excessive CPU consumption during signature verification by providing a crafted public key with an oversized modulus or DSA parameter.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Golang.Org/X/Crypto
Golang.Org/X/Crypto/Ssh