The RSA and DSA public key parsers did not enforce size limits on key parameters. A crafted public key with an excessively large modulus or DSA parameter could cause several minutes of CPU consumption during signature verification. This could be triggered by unauthenticated clients during public key authentication. RSA moduli are now limited to 8192 bits, and DSA parameters are validated per FIPS 186-2.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 22 May 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 |
Fri, 22 May 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The RSA and DSA public key parsers did not enforce size limits on key parameters. A crafted public key with an excessively large modulus or DSA parameter could cause several minutes of CPU consumption during signature verification. This could be triggered by unauthenticated clients during public key authentication. RSA moduli are now limited to 8192 bits, and DSA parameters are validated per FIPS 186-2. | |
| Title | Invoking pathological RSA/DSA parameters may cause DoS in golang.org/x/crypto/ssh | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2026-05-22T02:31:27.324Z
Reserved: 2026-04-07T18:13:03.528Z
Link: CVE-2026-39829
No data.
Status : Received
Published: 2026-05-22T04:16:22.310
Modified: 2026-05-22T04:16:22.310
Link: CVE-2026-39829
No data.
OpenCVE Enrichment
Updated: 2026-05-22T04:30:25Z
Weaknesses