CVE-2026-39829
概要

The RSA and DSA public key parsers did not enforce size limits on key parameters. A crafted public key with an excessively large modulus or DSA parameter could cause several minutes of CPU consumption during signature verification. This could be triggered by unauthenticated clients during public key authentication. RSA moduli are now limited to 8192 bits, and DSA parameters are validated per FIPS 186-2.

公表日 2026年5月22日13:16
登録日 2026年5月23日4:08
最終更新日 2026年5月22日13:16
関連情報、対策とツール
共通脆弱性一覧