CVE-2026-39832

critical

Description

When adding a key to a remote agent constraint extensions such as [email protected] were not serialized in the request. Destination restrictions were silently stripped when forwarding keys, allowing unrestricted use of the key on the remote host. The client now serializes all constraint extensions. Additionally, the in-memory keyring returned by NewKeyring() now rejects keys with unsupported constraint extensions instead of silently ignoring them.

References

https://pkg.go.dev/vuln/GO-2026-5006

https://groups.google.com/g/golang-announce/c/a082jnz-LvI

https://go.dev/issue/79435

https://go.dev/cl/778642

Details

Source: Mitre, NVD

Published: 2026-05-22

Updated: 2026-05-22

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Severity: Critical