CVE-2026-39829

high

Description

The RSA and DSA public key parsers did not enforce size limits on key parameters. A crafted public key with an excessively large modulus or DSA parameter could cause several minutes of CPU consumption during signature verification. This could be triggered by unauthenticated clients during public key authentication. RSA moduli are now limited to 8192 bits, and DSA parameters are validated per FIPS 186-2.

References

https://pkg.go.dev/vuln/GO-2026-5018

https://groups.google.com/g/golang-announce/c/a082jnz-LvI

https://go.dev/issue/79565

https://go.dev/cl/781661

https://go.dev/cl/781641

Details

Source: Mitre, NVD

Published: 2026-05-22

Updated: 2026-05-22

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Severity: High