CVE-2026-39829
Description
The RSA and DSA public key parsers did not enforce size limits on key parameters. A crafted public key with an excessively large modulus or DSA parameter could cause several minutes of CPU consumption during signature verification. This could be triggered by unauthenticated clients during public key authentication. RSA moduli are now limited to 8192 bits, and DSA parameters are validated per FIPS 186-2.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unenforced size limits in RSA/DSA public key parsers allow unauthenticated clients to cause minutes-long CPU consumption via crafted keys.
Vulnerability
In the golang.org/x/crypto SSH package, versions before v0.36.0, the RSA and DSA public key parsers did not enforce size limits on key parameters. A crafted public key with an excessively large RSA modulus or oversized DSA parameters can cause signature verification to consume CPU for several minutes. Affected packages are those using the golang.org/x/crypto/ssh module prior to the fix. The patch limits RSA moduli to 8192 bits and validates DSA parameters per FIPS 186-2 [1], [2], [3].
Exploitation
An unauthenticated client can trigger the vulnerability by presenting a maliciously crafted public key during SSH public key authentication. The attacker only needs network connectivity to an SSH server or client that performs signature verification using the vulnerable parsers. No additional authentication or user interaction is required [1], [3].
Impact
Successful exploitation causes a denial-of-service (DoS) condition: the target system spends several minutes of CPU time verifying the crafted key, potentially exhausting CPU resources for other tasks. The vulnerability does not lead to code execution, privilege escalation, or information disclosure; the impact is limited to CPU exhaustion [1], [2].
Mitigation
The fix is included in golang.org/x/crypto version v0.36.0 and later. Users should update to this version or newer. No workaround is available; systems running vulnerable versions should apply the update as soon as possible. There is no indication that this CVE is listed in CISA's Known Exploited Vulnerabilities catalog [2], [3].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.