Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service. This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool. | |
| Title | Inefficient policy validation in crypto/x509 | |
| References |
|
Status: PUBLISHED
Assigner: Go
Published:
Updated: 2026-04-08T01:06:58.354Z
Reserved: 2026-03-11T16:38:46.556Z
Link: CVE-2026-32281
No data.
Status : Received
Published: 2026-04-08T02:16:03.350
Modified: 2026-04-08T02:16:03.350
Link: CVE-2026-32281
No data.
OpenCVE Enrichment
No data.